Font Size: a A A

Executable File Binder Design And Implementation

Posted on:2020-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhaoFull Text:PDF
GTID:2428330575975444Subject:Engineering
Abstract/Summary:PDF Full Text Request
Today,computer technology and anti-Trojan horse technique fierce struggle,Trojans complex technology to the computer system security,and caused incalculable economic damage to the world,but also to anti-Trojan technology has brought enormous challenge.As people continue to study,especially in the file bundle Trojan technology is the development of technology matures,the Bundled Trojanshasbecomed primary means of Trojans spread.Therefore,research on executable file binding technology is already urgent.Based on the current domestic government affairs development trend,in response to the demand for paperless office of the party and government,Hebei Province is currently carrying out the construction project of the e-government intranet,which includes the electronic document circulation system and studies the binding technology of executable documents.It can greatly enhance the security and reliability of electronic document transmission,so as to effectively prevent the binding of other malicious code and other Trojan horses.It can also ensure the security of electronic documents by studying the binding technology of executable files to hide files that are not easy to disclose according to needs.Bundle file for the executable file bundled technology is sometimes bundled with Trojan one of the most widely used techniques.Executable files bundled technology refers to two or more of the files bundled together into an executable file,in the implementation of this document,the files are bundled inside the user does not know the circumstances autonomous running.This paper first expounds the background and significance of the research,then introduces the development of the computer Trojan horse,classification,camouflage method,killing methods and other issues,and then tells about the Trojan horse technology binding technology different categories.This program uses the C language and visualizes the interface through MFC,and initially demonstrates the concept of file binding through several other binding implementations.According to the technical route and experimental plan of the subject,based on the research of technology and file bundled Trojan technology,thisipapperintroduction of several common Trojans bundled and append to the file and the separeation of basic ideas,analysis of the executable file bundled with the basic principle,summed up the basic processes and procedures bundled,a detailed description of one of the key details,and make the appropriate code,showing the executable file bundle principle and specific methods.The topic introduces the key technologies in detail before the programming implementation.In order to facilitate the hiding of the file,we obtain the properties of the file through a specific data structure,and change the properties of the file by setting the attribute function.After the process of file bundling and separation occurs,the self-deletion of the executing files is achieved through multiple processes and batch processing.Programming the visual interface of the program to facilitate user operation.In the research and development test work,through the continuous function and performance testing of the program,many improvements have been made.The functional effect of this program is in line with expectations.Finally,the program can be used to bundle and unbundle the non-shell executable files to meet the requirements of the project.
Keywords/Search Tags:computer Trojan, executable file, bonding technology
PDF Full Text Request
Related items