Research on Trojan Horse Hiding and Residence Technology According to Ghost Restoration

郑成,王轶骏,薛质
DOI: https://doi.org/10.3969/j.issn.1009-8054.2012.01.050
2012-01-01
Abstract:Ghost reduction system is widely used in the computer system restoration, this technology is easy to use while contains certain safety hidden trouble. This paper first describes Ghost image file format, and tells of its analytical process and principles. And on this basis, this paper draws out the Trojan hiding and residence technology of the Ghost image reduction system, and analyzes the realization of command line tool which can penetrate the Ghost image file. This tool reads and analyzes Ghost image file, and then writes in the back door to their files, thus to realize the Trojan horse hiding and residence. This paper finally puts forth how to prevent and detect the hiding and residing Trojan by this method, and thus to ensure the integrity and safety of restored system.
What problem does this paper attempt to address?