Novel process-protecting method using camouflage techniques based on direct kernel object manipulation

Zhiling Lan,Yubo Song,Lei Tang
DOI: https://doi.org/10.3969/j.issn.1001-0505.2013.01.005
2013-01-01
Abstract:Current process-protecting method based on process-hiding is easy to be detected by Rootkit detection tools and hence fails to protect processes. To solve this problem, a novel process-protecting method using camouflage techniques based on direct kernel object manipulation (DKOM) is proposed. This method combines DKOM techniques with traditional process-disguising techniques. To protect the process, it is made to display as a system process in the task manager by altering structures storing process information in the kernel space of the operating system. To manipulate the kernel object, the modification should be implemented by a Windows driver, which is compatible with Windows 2000 and Subsequent versions. The experimental results show that the process information retrieved from process explorer tools is identical to the system process. The process being disguised cannot be perceived by users or detected by Rootkit detection tools. The effectiveness of this process-protecting method using camouflage techniques based on DKOM is verified.
What problem does this paper attempt to address?