Introduction to Back Door and Defensive Method of DLL

David A. Morton,Kerry D. Peterson,Kurt H. Albertine
DOI: https://doi.org/10.3969/j.issn.1006-4052.2010.10.047
2010-01-01
Abstract:With the computer and network technology,the rapid development of the back door of the increasing threats to information security.The authors adjusted the back door to look into the idea of a dynamic link library,so that there can be no process,no open ports etc.,thus achieving a process,the port hidden,so the back door DLL-based prevention and information security problems has become a more important object of study worthy of attention.This article describes the types of Trojan horse program works and realization of the function,describing the main API functions,and summarizes a number of DLL Trojans killing methods.
What problem does this paper attempt to address?