Research on the Hidden Technology of Troy Trojan-Horse
- https://doi.org/10.2991/msam-17.2017.69How to use a DOI?
- trojan horses; hiding technology; network security; DLL technology
The hidden technology of Trojan horses was investigated. Through the analysis of the original Trojan hiding technology, it improved the local hiding ability of the Trojan horse and construe randomly selected octed the Trojan horse which embodied the collaborative hiding ability. I put forward a Trojan horse hiding technology framework which based on the DLL. By using the remote thread technology which inserted the DLL Trojan into system process whose name was svchost.exe, which realized hidden operations of the Trojan horse. When using the remote thread technology to start-up Trojan, one of the svchost.exe as a host process. It increased the difficulty of killing the Trojans, enhanced the concealment, improved the overall anti Trojan detection and anti killing ability.
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Ting Mao AU - Shengbing Che AU - Wei Deng PY - 2017/03 DA - 2017/03 TI - Research on the Hidden Technology of Troy Trojan-Horse BT - Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics (MSAM2017) PB - Atlantis Press SP - 304 EP - 307 SN - 1951-6851 UR - https://doi.org/10.2991/msam-17.2017.69 DO - https://doi.org/10.2991/msam-17.2017.69 ID - Mao2017/03 ER -