Dissertations / Theses on the topic 'Rootkit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Rootkit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gach, Tomáš. "Generická detekce bootkitů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236369.
Full textPlocek, Radovan. "Klasifikace rootkitů a jimi používaných technik." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412900.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textVibhute, Tejaswini Ajay. "EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4485.
Full textEsoul, O. "VMX-rootkit : implementing malware with hardware virtual machine extensions." Thesis, University of Salford, 2008. http://usir.salford.ac.uk/26667/.
Full textVasisht, Vikas R. "Architectural support for autonomic protection against stealth by rootkit exploits." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26618.
Full textCommittee Chair: Lee, Hsien-Hsin; Committee Member: Blough, Douglas; Committee Member: Copeland, John. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Xuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.
Full textCommittee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Zhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.
Full textPh. D.
Persson, Emil, and Joel Mattsson. "Debug register rootkits : A study of malicious use of the IA-32 debug registers." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3609.
Full textLi, Jie, and Yuting Lu. "Rootkits." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8378.
Full textAbstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. Since theinvolved core techniques are beginning to catch on nowadays, we should analyzesome new key techniques employed for application of Rootkits, discuss the specificmethods and propose a set of defense strategy for computer security.
Procházka, Boris. "Útoky na operační systém Linux v teorii a praxi." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237139.
Full textFarr, C. R. "Treatment of Rootknot Nematodes." College of Agriculture, University of Arizona (Tucson, AZ), 1987. http://hdl.handle.net/10150/204511.
Full textFannon, Robert C. "An analysis of hardware-assisted virtual machine based rootkits." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42621.
Full textThe use of virtual machine (VM) technology has expanded rapidly since AMD and Intel implemented hardware-assisted virtualization in their respective x86 architectures. These new capabilities have resulted in a corresponding expansion of security challenges. Hardware-Assisted VM (HVM) rootkits have become a credible threat because of these new virtualization technologies and have provided an added vector with which root access can be exploited by malicious actors. An HVM rootkit covertly subverts an Operating System (OS) running on a general purpose x86 based processor and migrates that OS into a VM under the control of a malicious hypervisor. This results in the hypervisor possessing an effective privilege level of ring -0, a higher privilege level than ring 0, which the target OS possesses in either its non-virtualized or virtualized state. The only known successful HVM rootkits are Blue Pill and Vitriol. This thesis analyzes and compares the source code for both AMD-V and Intel VT-x implementations of Blue Pill to identify commonalities in the respective versions' attack methodologies from both a functional and technical perspective. Findings conclude that their functional implementations are nearly identical; but their technical implementations are very different, primarily because of differences in the AMD-V and Intel VT-x specifications.
Farr, C. R. "Nematocide Comparisons for Rootknot Nematode Control." College of Agriculture, University of Arizona (Tucson, AZ), 1986. http://hdl.handle.net/10150/219774.
Full textPreplant treatments for rootknot nematodes on sandy loam gave less yield response than in earlier years at the same Buckeye field location. Post emergence treatments on sandy loam at Waddell failed to give sufficient economic return even though lateral root infestation level was over 50 percent.
Russell, Jonathan David. "The rootlet system of rhizocephalan barnacles." Thesis, Bangor University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285467.
Full textNigh, E. L. Jr. "Management of Rootknot Nematode in Arizona Cotton." College of Agriculture, University of Arizona (Tucson, AZ), 1989. http://hdl.handle.net/10150/204865.
Full textFarr, Charles. "Nematocide Use for Control of Rootknot Nematodes." College of Agriculture, University of Arizona (Tucson, AZ), 1988. http://hdl.handle.net/10150/221226.
Full textBohl, Christina [Verfasser], and Ernst Wolfgang [Akademischer Betreuer] Kühn. "Untersuchungen zu Wechselbeziehungen zwischen ziliärem Rootlet und Primärzilie." Freiburg : Universität, 2014. http://d-nb.info/1123479410/34.
Full textHusman, S., M. McClure, J. Lambeth, T. Dennehy, and B. Deeter. "Telone II® and Temik® Efficacy on Rootknot Nematodes in Cotton." College of Agriculture, University of Arizona (Tucson, AZ), 1995. http://hdl.handle.net/10150/210330.
Full textNabi, Md Ashikun. "Multiple Functions Of The Striated Rootlet Proteins Of The Paramecium Basal Body." ScholarWorks @ UVM, 2018. https://scholarworks.uvm.edu/graddis/951.
Full textBingham, Sonia Nicole. "Aquatic macroinvertebrate use of rootmat habitat created by eight woody riparian species." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1245417333.
Full textBoyd, Joseph Samuel. "Eyespot Assembly and Positioning in Chlamydomonas reinhardtii." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/145298.
Full textAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Full textPorter, Jeremy. "Detecting Malicious Behavior in OpenWrt with QEMU Tracing." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1564840733498961.
Full textPicariello, Tyler August. "Meckelin Functions in the Guided Movement and Orientation of Basal Bodies Prior to Duplication in Paramecium tetraurelia." ScholarWorks @ UVM, 2015. http://scholarworks.uvm.edu/graddis/367.
Full textAfrim, Cerimi, and Joakim Norén. "Motåtgärder vid IT-forensisk liveanalys." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15432.
Full textLive Analysis is a concept that in this paper means analyzing a computer system while it is running. This can be done for several reasons, such as when there is a risk that the system has encryption which can be activated when the system shuts down. Otherwise, it is common if you want to examine network connections, active processes or other phenomena that can be volatile, i.e. disappear when the system shuts down. This work will focus on countermeasures to live forensic analysis and describe different methods and strategies that can be used for these countermeasures. For example, we wrote a program that automatically shuts down the system when you insert a USB memory stick or any other media. These are usually the media which you have your forensic programs on when you do a live analysis. Other important elements of the work are the use of encryption, timestamps and malicious code for challenging live analysis. Our analysis of the topic shows that it is relatively easy to prevent that a live analysis can be performed in a reliable way.
Blaauw, Pieter. "Search engine poisoning and its prevalence in modern search engines." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002037.
Full textLacombe, Eric. "Sécurité des noyaux de systèmes d'exploitation." Phd thesis, INSA de Toulouse, 2009. http://tel.archives-ouvertes.fr/tel-00462534.
Full textGrizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Full textSchwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
Lin, Yu-chan, and 林郁展. "Discoverer- a realtime Rootkit detection system." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/28572747271333705716.
Full text國立中央大學
資訊工程學系碩士在職專班
100
Rootkit is most often used by attacker to hide their behavior, the Rootkit detection mechanisms mostly focus on static characteristics or the integrity of the system, but the attacker can confuse the system eigenvalues through various ways , and the integrity of the rapid real-time confirmation would not be easy to reach. This paper presents an accurate, rapid real-time Rootkit detection mechanisms-Discoverer-to enhance the ability of the system to detect Rootkit. Since the attacker''s network connection and the running process is the main hidden object of Rootkit, Discoverer by locating the hidden network connections and process to detect Rootkits. In order to manage network connections and process, the operating system contains a variety of data structures to record the relevant message, the attacker can be added or even modify the code to allow users to not know the attacker''s network connection, or are under implementation process of the attacker, but if by tampering with the network connection or process-related data structures, such as the run queue, to achieve the above purpose, they are likely to undermine the normal functioning of the system, so the information in these data structures can be a true reflection of system status information, this paper list and send all the user mode process information (such as ps, the netstat) into the Kernel by adding the new system call, and compare one by one with kernel data .Then find out the hidden process PID, socket connections, and the access file name and path. The experimental results show that Discoverer can accurately detect all kinds of Rootkits which we collected.
Kan, Kai Lun, and 甘凱綸. "Using low-cost RFID for Rootkit countermeasures." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/26844489635538646755.
Full text長庚大學
資訊管理學系
98
Rootkit can automatically invade your system and install without asking (the computer user’s) permission. Rootkit is purposely hidden so it is difficult to detect. Anti-virus programs may not be able to remove the invading malware completely as Rootkit can be well hidden and can possibly stay in the system as a repair file or combine with some kinds of spyware or malware. Most crackers favor this kind of virus attack. This research discusses the repercussion of Rootkit to health care information fields to understand the importance of protection against Rootkit’s intrusion into hospital files. This is especially important when we needed to protect the privacy and security of patient medical data so this information will not be leaked to outsiders. In a hospital database server, it is possible that information can be circulating through e-mail, audio or video from recorded meetings, and electronically stored meeting minutes could be acquired by Rootkit. Medical R & D or any hospital administrative decisions could be taped or intercepted without being noticed creates a substantial vulnerability for the hospital database server. In addition, the exchange of patients’ medical data files among hospital staffs, personnel work shift arrangement, procedures of doctors’ diagnosis, or even patients’ medical files can all be deliberately altered. A vulnerability to Rootkit adversely affects patients. Because of the implications of a hospital’s database server is vulnerable to Rootkit as information technology is used by the medical system, we must also feverishly protect the security of information before the hospital’s proprietary knowledge is lost or appropriate patient care is altered. In this research, we want to define a new Rootkit attack corresponding to the countermeasure. We used the low computing operators which composed with the symmetric key, exclusive or (XOR) operation and hash-based message authentication code (HMAC) to communicate in the proposed mechanism. We will use a symmetric key to encrypt and decrypt the data which are transferred among the reader, database server and the user. We also use the XOR to compute the recover operator to recover the modified data. Finally we will use HMAC to gain the digested code that used value k to hash the cipher text to compare with the true data and false data. In recent years, there are many theories of RFID identity security mechanisms have been proposed, although these methods in security issues has improved, but they are unable to provide a high transmission efficiency of protection. Therefore, in considering the information security is also necessary to take into consideration the feasibility of the problem. This research uses the HMAC and XOR operation to manually discover a database server privacy protection in the backward-looking mechanism for retrieving false data. Contributions to the method are: (1) even if the data was transferred to the other users the data is useless; (2) efficiency for the most prevalent the low computing, the low memory capacity with a large database server. This research can be referred to all researchers who want to understand the Rookit operations.
Chen, Yuh-Chen, and 陳昱成. "A Study on Polymorphic Windows Kernel Mode Rootkit." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/92312229637569799284.
Full text大葉大學
資訊管理學系碩士班
96
More and more malicious programs are combined with rootkits to shield their illegal activities and the result makes security products face a challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel. Therefore, the role of a detector for detecting Windows driver-hidden rootkits is becoming extremely important. In this thesis, we first develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation, and have verified that it can successfully avoid well-known rootkit detectors. And we then propose a countermeasure to detect it. We affirm our efforts will be extremely useful for improving the current techniques of detecting Windows driver-hidden rootkits.
Huang, Chun-Hao, and 黃軍皓. "A Study on Metamorphic Linux Kernel Mode Rootkit." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/04757711331947289605.
Full text大葉大學
資訊管理學系碩士班
94
Although defense mechanisms such as implementing antivirus software, anti-spy software, all kinds of hardware or software firewalls, and the latest fixing tools may prevent the system from attacking by malicious software, it is still hard to catch up with the pace of every transformation of malicious software. Recently, malicious software with rootkit technology is affecting the system security and makes related detecting techniques become more and more unsatisfactory and even ineffective. Rookit first appeared in 1990s and its attack targets are Sun and Linux operating systems. Nowadays over sixty kinds of rookits exist in the cyberspace, which has a great impact on information security. If we want to develop a more efficient and accurate detecting technique, we have to understand its developing process, technology and characteristics so that we can prevent our systems from being intruded by rootkit technology in advance. Rootkit can be divided into two types: user mode and kernel mode. The former is easily to be detected by rootkit detections tools. The latter is difficult to be recognized; especially,a variety of metamorphic rootkits will greatly threaten the whole security of systems. Therefore, this thesis will emphasize on kernel mode rootkit technology, and further develop a metamorphic Linux Kernel Mode Rookit, which can’t be detected by current rootkit detecting software tools. Moreover, we also discuss the corresponding detecting method for finding the proposed metamorphic rootkit such that it would be a practical reference for the subsequent development of metamorphic rookit detections.
Hsiao, Wei-Yun, and 蕭維昀. "A Real-time Defense Mechanism for DKOM-Rootkit." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/60388785430389473573.
Full text國立臺北大學
資訊工程學系
102
With the development of computer technology widely applied in every walk of life, all kinds of important information are stored in computer and transported through Internet. So the system security has become a popular research target. As there are so many vulnerabilities exist in modern computer operating system and internet, the operating system is vulnerable to many types of attacks. One of the most popular attack techniques is Rootkit. Rootkit has a lot of technical tricks, so nowadays no one can claim their antivirus that have ability to understand it and caught Rootkit precisely. Furthermore, it is helpless for unknown Rootkit and complex-type Rootkit. The goal of this thesis is propose a defense and detection scheme on Rootkit. Analysis the attack techniques of Rootkit firstly, and do in-depth research on DKOM technology. In this thesis, a detailed description on detection technologies and defense techniques is being discussed, and then analysis the advantages and disadvantages. Finally, extract techniques from above mentioned which enhance designed to oppose Rootkit invasion. In order to improve the capability and hit rate, a new defense and detection method is proposed which is based on Windows DKOM-Rootkit. It’s not only achieve intercept but also point out the hidden address accurately by purpose mechanism. Ensure the security of computer systems.
Κοζυράκης, Ιωάννης Μάριος. "Τεχνικές ανίχνευσης rootkit και ανάπτυξη εφαρμογής για την αφαίρεσή του." Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/1625.
Full text-
Wang, Wen-Kai, and 王文楷. "A New Rootkit and Its Detection in Windows 7 64bit." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20880803623463145590.
Full text中國文化大學
資訊安全產業碩士專班
102
This thesis is a study on a new rootkit in the Windows 7 64 bit operating system and its detection. This rootkit has two types of attack techniques. The first attack techniques is using DKOM technology to modify the ePROCESS object in the windows memory that for hiding process. And the second attack techniques is using the SSDT hook technology to change two kernel API, NtTerminateProcess and NtQueryDirectoryFile, for restricting deletion process and hidden files. It is through the above attack techniques to understand the weakness of the Windows 7 64 bit operating system. So we can find new rootkit by analysis of the SSDT memory address and kernel object’s flink and blink fields。 This study found that a new rootkit can attack the Windows 7 64 bit operating system by using the jump function in the kernel space of the memory, and change the kernel object by bypassing the PatchGuard protection.
CHEN, CHANG, and 張真. "Integrated Technologies for Defending against Rootkit Malware in Cloud Service Environments." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/82938664724855632570.
Full text大葉大學
資訊管理學系碩士班
102
The rapid development of cloud computing technology has been becoming an important base of information technology, and makes life more convenient, as long as the platform will be able to connect to the Internet using cloud services. Convenient service allows users and enterprises to use a lot of data storage, and therefor cloud security issues are very crucial. Rootkit techniques to hide many of which were combined to conceal malware, so the cloud system security is facing enormous challenges. Thus, malware hidden in cloud applications, such as spyware and Rootkit, has been becoming the object of information security focus. Although there are many commercially available Windows rootkit detection software developedto effectively prevent know rootkits, for an unknown type of windows cloud operating system Rootkit, they often are unable to work effectively. Therefore, the design of an effective Windows Kernel Mode Rootkit detection for cloud operating systems is very important, especially to defend against driver-hidden rootkits. This study is to construct integrated kernel mode rootkits prevention techniques for windows cloud operation systems, in particular, against unknown type of rootkits, So that cloud operating system security threats and potential damage can be removed to construct cloud security basis.
Chen, Jun-Han, and 陳俊翰. "Effective Rootkit Malware Detection Technologies for Smartphone Based on Open Source." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/35586405657298935707.
Full text大葉大學
資訊管理學系碩士班
102
With the increasing popularity of information security issues are also smart mobile devices attendant, security can not be ignored. Android platform because of its superior choice for many consumers with the freedom to use, but Google Play shelves without rigorous audit system under the circumstances, allow a malicious software on the Android platform is very rampant. After the fact, there is no strong Rootkit itself destructive, but hidden Rootkit technology if integration with other malware become variant Rootkit, will make the mobile phone operating system security and defense raised the alarm. Therefore, how to effectively prevent the phone is malware invasion, it is particularly important. With malicious software on smart mobile devices continues to introduce new, Rootkit hidden features likely to be used off packaged as malware, thus achieving its invasion purposes. In today's viral infection, we can know the network transmission is a major key, the actual occurrence of this study will be conducted in malicious software for smart mobile devices Rootkit detection. While open source Rootkit detection tool can save costs also have some ability to detect, but the relevant literature indicates that existing open Rootkit detection tool is quite insufficient capacity, this study will improve the existing open-Rootkit detection tools to improve its ability to detect, protect the safety of existing smartphone users.
Lai, Wei-Lun, and 賴瑋倫. "Reinforcing the Defense against Rootkit-based Malicious Software in Cloud Computing Environment." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/05688434876090479067.
Full text大葉大學
資訊管理學系碩士班
101
With the popularity of cloud computing, security issues have also been generated, and thus the security of cloud’s virtual machine service platforms cannot be ignored. For rootkit malware prevention issues, due to a variety of new kernel mode rootkits will cause serious destruction to the kernel of the operating systems, even the Apple MAC system which is well known for no virus invasion also failed, and therefore rootkits have attracted more and more attentions all over the world. Many rootkits targeting the Microsoft Windows operating systems were made, and the systems destructed are extended to the cloud virtual machines instead of stand-alone systems. In the current technologies of detecting Windows rootkits, although some well-known detection software can detect known rootkits, it cannot detect variant rootkits effectively. The contribution of this research is to combine the signature-based detection and cross-view detection to enhance the detection capabilities in cloud’s host operating systems and guest virtual machine operating systems. Furthermore, the TPM (Trusted Platform Module) embedded systems technology is also integrated with the proposed detection mechanism to promote the high detection rate. The results obtained are to find the main weaknesses of the Windows Server 2008 host operating systems and Windows 7 guest operating systems to effectively help construct the basis of secure virtual machine platforms in cloud services.
Tseng, Shu-Ting, and 曾淑婷. "A Study on Registry-hidden Rootkit Detection Mechanism in Cloud Service Environments." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/78285936272779202170.
Full text大葉大學
資訊管理學系碩士班
101
In considerations of international big factories such as Google, Microsoft, Amazon, IBM, Dell, Sun, HP and so on entering the territory of cloud computing, application of cloud and virtualization technology has led to better desktop software using experiences in the Personal Computer area. As a result, the malware hiding in cloud virtual machine, particularly spywares and rootkits, have become the key preventive objects in the computer security territory. Regarding malware development, possessing certain degree of hiding function has been becoming a trend. Under Microsoft Windows systems, the existence and operation of malwares cannot be independent of related information registry in the system. Additionally, malwares often hide in the registry, so it is difficult to delete them completely. Consequently, how to effectively detect rootkits that hide in the registry has been becoming especially important. Although there are famous detection tools that can detect rootkits that hide in the registry, they often fail to detect new types of rootkits. In order to detect rootkits that hide in operating systems based on tampering registry file, this research analyzes the rootkit hiding technology in registry and related rootkit detection technologies. After analyzing the registry file format and operation controlling flow, this research designs a new type of registry based rootkit hiding technology, and then develops rootkit detection mechanism based on the experiences of designing the new type of rootkit. By the flow of virtualizing registry and registry key value flow at bottom tier in the Win 32 system, the actually valid registry key can be obtained, which can effectively detect hinding rootkits in cloud environments.
Chi, Cheng-Hua, and 杞承樺. "A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/37856256552890637490.
Full text大葉大學
資訊管理學系碩士班
101
Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In this rootkit-combined technique, “removing double linked list” and “using system services” are very hard to detect, which is why it always let users download data unconsciously and spread to contiguous systems and networks gradually by opening files. The way of attack is hiding to wait opportunities, and is controlled by a remote server. And pretends to be proper procedures or threads after conveying instructions, and steals important information by network transfer back to the attacker. The above-mentioned trick is called the technique of “APT” (Advanced Persistent Threat) which becomes a big menace to cloud services. Although famous anti-virus software can detect process-hidden rootkits, they still cannot work when confronting to mixed rootkits. Therefore, this research will develop a mechanism for detecting process-hidden rootkits in cloud operating systems to avoid APT attacks on clouds, which can effectively detect mixed rootkits of “removing double linked list” and “using system services”. Moreover, the proposed mechanism can help anti-virus software and cloud systems service provider develop a complete protection mechanism against rootkit attacks.
Li, You-Ru, and 李侑儒. "A Study on Protecting Android Operating Systems Based on Rootkit Stealth Technologies." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/29983409767821322791.
Full text大葉大學
資訊管理學系碩士班
103
With the popularity and universal of smart mobile devices, security issues are crucial and cannot be ignored. Concerning the open source based Android software development and Google Play open platform, it is no rigorous approval system and anyone can publish applications on Google Play, so the malware of Android platform has been gradually increasing. Although the Android platform has a variety of security technologies to protect the system, hackers still have tricks to escape detection to steal users’ data. Therefore, enhancing the security of Android systems has been becoming increasingly significant. In this study, the implementation of protection technologies in the kernel of Android, instead of implementing it at the application layer potentially provides great benefits of preventing malicious user space applications from subverting the system resources, and thus effectively removes external threats and potential damages to the Android operating systems to build the security infrastructure for Android service platform. This study has developed the stealth technologies for protecting Android system kernel from a variety of attacks, and then verify that the proposed subtle stealth technologies can successfully avoid subversion of a wide variety of Android root-theft malware. Because Android is open source software based on Linux Kernel, the software investment cost for constructing the effective Android kernel protection technologies will be significantly reduced, and the proposed technologies can be also increasingly strengthened via the resources of the open source community.
Litty, Lionel. "Architectural Introspection and Applications." Thesis, 2010. http://hdl.handle.net/1807/24817.
Full textHsing, Chieh, and 邢傑. "An Efficient Solution for Hook-Based Kernel Level Rootkits." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/71998633525300700162.
Full text國立清華大學
資訊系統與應用研究所
97
It is easy to discover if there are hooks in the System Service Dispatch Table (SSDT). However, it is difficult to tell whether theses hooks are malicious or not after finding out the hooks in the SSDT. Thus, we observe the behavior of these hooks by re-calling the original Native API and examine the results in order to make a better decision. When the users inspect their computers by existing tools (e.g., Rootkit Unhookers, Rootkit Hook Analyzer) and find out some hooks, they do not know what to do next because honest softwares (e.g., Anti-Virus Software, On-Line-Game) may also hook SSDT. In this paper, we propose a scheme that evaluates the hooks by comparing the returned results before and after hooked. Through this comparison, if a malicious hook which hides itself by the way of modifying the parameters passed to the Native API, we can easily detect this difference. Furthermore, we use a runtime detour patching technique so that it will not perturb the normal operation of user-mode programs. Finally, we discuss the existing approaches of rootkits detection both user-mode and kernel-mode. Our method effectively monitors the behavior of hooks and brings an accurate view point for users to examine their computers.
Corregedor, Manuel Rodrigues. "Utilizing rootkits to address the vulnerabilities exploited by malware." Thesis, 2012. http://hdl.handle.net/10210/6257.
Full textAnyone who uses a computer for work or recreational purposes has come across one or all of the following problems directly or indirectly (knowingly or not): viruses, worms, trojans, rootkits and botnets. This is especially the case if the computer is connected to the Internet. Looking at the statistics in [1] we can see that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and or prevention of malware. Furthermore the statistics in [2] show that malware infection rates are increasing around the world at an alarming rate. The statistics also show that there are a high number of new malware samples being discovered every month and that 31% of malware attacks resulted in data loss [3], with 10% of companies reporting the loss of sensitive business data [4][5]. The reason for not being able to achieve a 100% detection and / or prevention of malware is because malware authors make use of sophisticated techniques such as code obfuscation in order to prevent malware from being detected. This has resulted in the emergence of malware known as polymorphic and metamorphic malware. The aforementioned malware poses serious challenges for anti-malware software specifically signature based techniques. However a more serious threat that needs to be addressed is that of rootkits. Rootkits can execute at the same privilege level as the Operating System (OS) itself. At this level the rootkit can manipulate the OS such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. It is clear from the statistics that anti-malware products are not working because infection rates continue to rise and companies and end users continue to fall victims of these attacks. Therefore this dissertation will address the problem that current anti-malware techniques are not working. The main objective of this dissertation is to create a framework called ATE (Anti-malware Technique Evaluator) that can be used to critically evaluate current commercial anti-malware products. The framework will achieve this by identifying the current vulnerabilities that exist in commercial anti-malware products and the operating system. The prior will be achieved by making use of two rootkits, the Evader rootkit and the Sabotager rootkit, which were specifically developed to support the anti-malware product evaluation. Finally an anti-malware architecture we called External Malware Scanner (EMS), will be proposed to address the identified vulnerabilities.
Lin, SHI-JIA, and 林士嘉. "An Effective Scheme for Protecting against Windows Kernel-mode Rootkits." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/12058051180668887068.
Full text大葉大學
資訊管理學系碩士班
98
More and more malicious programs are combined with rootkits to shield their illegal activities so that result makes information security defense encounters a great challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel.In the current prevention schemes, the memory shadowing, kernel-mode code signing walkthrough and host-based intrusion prevention system are all to passively protect the operating systems, and they cannot identify whether rootkits intrude in the operating systems. On the other hand, though many companies or individuals have developed rootkit detectors to the public and undoubtedly they can detect known rootkits effectively, they cannot foresee what the result is when meeting unknown rootkits and crashed operating systems. Hence, the thesis will develop a prevention mechanism which can identify driver-hidden rootkits to protect the Windows-based operating systems. Our research constructs an anti-rootkit scheme for protecting Windows kernel to higher system security, especially for safeguarding Windows kernel from the damages of unknown driver-hidden rootkits. Moreover, we also test the proposed prevention scheme by Windows XP SP3 on the Testbed@TWISC platform. We affirm that our efforts are extremely useful for improving the current techniques of preventing Windows driver-hidden rootkits.
Huang, Yihsi, and 黃奕璽. "Windows Rootkits Detection Technologies for Service Platforms in Cloud Computing." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/25770337870424373300.
Full text大葉大學
資訊管理學系碩士班
99
With the growing popularity of cloud computing, the security issues in cloud computing also emerge. Currently, information security researchers are focusing on cloud data security, including cloud data privacy and confidentiality. However, the security protection of the virtual-machine service platform in cloud computing is also crucial. The service architectures in cloud computing are based on the virtualization technology, which can achieve rapid deployment, resources flexibility, rapid disaster recovery, cost reduction, and so on. But even though the virtualization technology has the advantages mentioned above, it still has to be constructed based on cloud operating systems. And once the cloud operating systems suffer the attack of malware, the virtual machines constructed using the cloud operating systems will collapse. Therefore, the security protection of cloud operating systems is particularly critical. Nowadays, more and more malicious programs are combined with rootkits to shield their illegal activities, and the result makes information security defense encounter a great challenge. To the best of our knowledge, existing literatures are mainly aimed at exploring protective measures for the Guest OS, while there are few researches involved in the security issues of the Host OS. Therefore, this thesis will firstly try to develop a technology for detecting unknown kernel-mode rootkits in Windows host operating systems for cloud compiting, and thus build the security infrastructure for the virtual-machine service platform in cloud computing. As for the research procedure, we will firstly develop a new-typed driver-hidden rootkit for Windows host operating systems. The proposed rootkit has the ability of escaping a wide variety of famous detecting software, and can be used to indicate the weakness of those well-known detecting software. Afterwards, we have developed an effective mechanism for detecting driver-hidden rootkits, including the proposed new-typed Rootkit threat and other existing rootkits. Through experimental test and analysis, we have found that, in the aspects of detection rate, detection time, CPU usage rate and I/O usage rate, the proposed mechanism is much more superior to the existing rootkit detection software developed by famous domestic and foreign anti-virus software manufacturers like ESET, AVAST and Trend Micro. Thus, we affirm that the proposed mechanism is extremely practical in the real world.
Lin, Ming-Hsiao, and 林明孝. "A Study on Detecting Metamorphic Rootkits Based on Tripwire Tool." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/19365306391583162648.
Full text大葉大學
資訊管理學系碩士班
94
With the rapid development and prevalence of Internet, more and more hackers rampant on the cyberspace invent out much more diverse and complex intrusion techniques. According to the bugs or defects of Linux and Windows operating systems, hackers can develop a great diversity of malicious software such as virus, worm, Trojan horse, backdoor, and rootkit. How to maintain a secure computing platform and avoid intrusion from hackers becomes a very crucial issue nowadays. Most host-based intrusion detection systems (HIDS) find out attacking evidences by filtering or auditing the operating system logs. However, hackers can place rootkits to get the root access right or leave backdoors, which let hackers intrude the system and change the system programs again. In such a way, administrators usually have little clue to detect it out. Consequently, this thesis focuses on the Linux system administrator‘s point of view to check out if the operating system has been placed a user mode rootkit. The proposed detecting mechanism is to employ the Chkrootkit tool to detect out the known rootkits, and then in terms of its intrusion characteristics, examine the integrity of system files by the Tripwire tool. From the database, we can first find out the abnormal items caused by the metamorphic rootkits, and then compare with the previously gained abnormal items generated by the known rootkits to find out metamorphic rootkits. Finally we also simulate the proposed detecting scheme to validate its feasibity.
Tsai, Being-Yu, and 蔡秉諭. "A Study on Effective Technology for Detecting Windows Kernel Mode Rootkits." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/25353094373204642564.
Full text大葉大學
資訊管理學系碩士班
97
More and more malicious programs are combined with rootkits to shield their illegal activities, and the result makes information security defense encounter a great challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through drivers in Windows Kernel. Thus, for the purpose of system security, the role of a detector for detecting Windows driver-hidden rootkits is becoming extremely important. However, we have verified currently well-known detecting software that it can not successfully avoid a variety of driver-hidden rootkit. Therefore, we propose a countermeasure to effectively detect Windows driver-hidden rootkits. Furthermore, we will also develop an effective scheme to unload the detected driver-hidden rootkit from Windows to achieve higher system security, in order to clearly remove the destructions from the system. After the proposal detecting scheme have been developed, we will test it on the Testbed@TWISC platform by Windows XP SP2 and SP3. We affirm our efforts will be extremely useful for improving the current techniques of detecting unknown Windows driver-hidden rootkits.
Santos, Maria Clara Vieira de Almeida dos. "A challenge : biocontrol strategies for the management of potato cyst and rootknot nematodes." Doctoral thesis, 2013. http://hdl.handle.net/10316/21652.
Full text