The Design and Implementation of the Trojan Horse Based on Kernel Hacking

Article Preview

Abstract:

It is an important ways that the Trojan Horse invades the Linux system through the kernel hacking. Its principle is using the mechanism provided by Linux kernel to realize Trojan Horse functions,which is mainly realized through the kernel programming. This paper has studied the two methods of kernel hacking with emphasis:Directly revises the kernel source codes and uses the Linux module mechanism. Finally, on this basis, a kind of kernel hacking Trojan Horse has been designed and realized.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2891-2894

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen Lijun. In-depth analysis of the Linux kernel source code. Beijing: People's Posts and Telecommunications Press.

Google Scholar

[2] Gao Guangyong, Chi Lejun, Wang Yanchun. The Research of Host Intrusion Detection System Related with Firewall [J]. Micro-computer information, 2005,7–3:66–68

Google Scholar

[3] devik.Linux on-the-fly kernel patching without LKM.2001,11.

Google Scholar