p.2870
p.2875
p.2879
p.2886
p.2891
p.2895
p.2899
p.2903
p.2908
The Design and Implementation of the Trojan Horse Based on Kernel Hacking
Abstract:
It is an important ways that the Trojan Horse invades the Linux system through the kernel hacking. Its principle is using the mechanism provided by Linux kernel to realize Trojan Horse functions,which is mainly realized through the kernel programming. This paper has studied the two methods of kernel hacking with emphasis:Directly revises the kernel source codes and uses the Linux module mechanism. Finally, on this basis, a kind of kernel hacking Trojan Horse has been designed and realized.
Info:
Periodical:
Pages:
2891-2894
Citation:
Online since:
November 2012
Authors:
Keywords:
Price:
Сopyright:
© 2012 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: