Research on Process Hiding Technology Based on Direct Kernel Object Manipulation

潘茂如,曹天杰
DOI: https://doi.org/10.3969/j.issn.1000-3428.2010.18.047
2010-01-01
Abstract:The realization mechanism of the Direct Kernel Object Manipulation(DKOM) and call gate are analyzed and proposed.By using call gate,it can promote the program’s privilege to modify the kernel’s process list to hide the process without the driver.A Trojan program is designed and implemented,and the hidden and survival functions are verified in experimental conditions based on the proposal.The experiments have proved that the Trojan can hide the process effectively and escape the detection and killing of the common security software.It also analyzes the Trojan program’s detection method.
What problem does this paper attempt to address?