Font Size: a A A

Anti-trojan Technology Research, Based On Identity Checks

Posted on:2012-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:X Z ChenFull Text:PDF
GTID:2218330335998129Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the preparation of technical Trojan, growing threat to users. In particular, some Trojans with a very cunning means to hide themselves, not only ordinary users find it difficult, and the mainstream anti-virus software and firewalls are imperceptible.Increasingly serious problem for the Trojans, the mainstream anti-Trojan technology is killing them, this paper presents a case-based anti-trojan technology. This paper introduces the Trojan relevant content, detailed analysis of the mainstream anti-trojan technology, pointed out some of their deficiencies. Then for their lack of identity checks is proposed anti-trojan technology. This paper describes the core idea of the technology, which allows only the identity of the program is running, not running as no identity, and analyze the feasibility of this. Its concepts and implementation process in detail. Status for the document library and then the establishment of its proposed two key points. Identity document mapping algorithm MD5 algorithm, the file data storage using SQLite as a database storage. Finally, the identity checks of key technologies, namely, the HOOK SSDT technology. This paper introduces the core concepts and implementation driven. Then described in detail the HOOK SSDT technology, and for this technology given the concrete implementation. Finally, a concrete realization of the identity checks. Using this technology, we implemented an anti-Trojan program, and tested using Trojan achieved the desired results.
Keywords/Search Tags:anti-Trojan, identity check, SQLite, SSDT, HOOK
PDF Full Text Request
Related items