메뉴 건너뛰기




Volumn , Issue , 2005, Pages 368-377

Detecting stealth software with Strider GhostBuster

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE - STRIDER GHOSTBUSTER; MALWARES; RESOURCE HIDING; STEALTH SOFTWARE;

EID: 27544461178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (114)

References (71)
  • 2
    • 60649121295 scopus 로고    scopus 로고
    • Invisible intruders: Rootkits in practice
    • [B99]
    • [B99] D. Brumley, "Invisible Intruders: Rootkits In Practice," ;login: The Magazine of USENIX and SAGE, http://www.usenix.org/publications/ login/1999-9/features/rootkits.html, 1999.
    • (1999) Login: The Magazine of USENIX and SAGE
    • Brumley, D.1
  • 5
    • 84875947153 scopus 로고    scopus 로고
    • Detours: Binary interception of win32 functions
    • [HB99], July
    • [HB99] Galen Hunt and Doug Brubacher. "Detours: Binary Interception of Win32 Functions," in Proc. the 3rd Usenix Windows NT Symposium, pp. 135-143, July 1999 (http://research.microsoft.com/sn/detours/).
    • (1999) Proc. the 3rd Usenix Windows NT Symposium , pp. 135-143
    • Hunt, G.1    Brubacher, D.2
  • 7
    • 27544441745 scopus 로고    scopus 로고
    • Loadable kernel modules
    • [J01], Nov.
    • [J01] K. Jones, "Loadable kernel modules," ;login: The Magazine of USENIX and SAGE, http://www.usenix.org/Publications/login/2001-11/pdfs/ jones2.pdf, Nov. 2001.
    • (2001) Login: The Magazine of USENIX and SAGE
    • Jones, K.1
  • 8
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • [KJ03], August
    • [KJ03] Rick Kennell and Leah H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," In Proc. USENIX Security Symposium, August 2003
    • (2003) Proc. USENIX Security Symposium
    • Kennell, R.1    Jamieson, L.H.2
  • 10
    • 84861263018 scopus 로고    scopus 로고
    • [MSDN]
    • [MSDN] Naming a File, http://msdn.microsoft.com/library/default.asp?url=/ library/enus/fileio/base/naming_ a_file.asp.
    • Naming a File
  • 11
    • 84897418201 scopus 로고    scopus 로고
    • [PE]
    • [PE] Process Explorer, http:/www.sysinternals.com/ntw2k/freeware/procexp. shtml.
    • Process Explorer
  • 15
    • 84861263879 scopus 로고    scopus 로고
    • [RIS] Remote Installation Services
    • [RIS] Remote Installation Services, http://www.microsoft.com/windows2000/ en/datacenter/help/default.asp?url=/windows2000/en/datacenter/help/ sag_RIS_Default_topnode.htm.
  • 17
    • 84862046998 scopus 로고    scopus 로고
    • [SR]
    • [SR] Windows XP System Restore, http://msdn.microsoft.com/library/ default.asp?url=/library/enus/dnwxp/html/windowsxpsystemrestore.asp.
    • Windows XP System Restore
  • 18
    • 84861261649 scopus 로고    scopus 로고
    • [SRM]
    • [SRM] System Restore Monitored File Extensions, http.//msdn.microsoft. com/library/default.asp?url=/library/enus/sr/sr/monitored_file_extensions.asp.
    • System Restore Monitored File Extensions
  • 20
    • 84861266558 scopus 로고    scopus 로고
    • Strider GhostBuster: Why it's a bad idea for stealth software to hide files
    • [W04], Work-in-Progress Report presentation, Aug.
    • [W04] "Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files," Yi-Min Wang, Usenix Security Symposium, Work-in-Progress Report presentation, http://www.usenix.org/events/sec04/tech/wips/, Aug. 2004.
    • (2004) Usenix Security Symposium
    • Wang, Y.-M.1
  • 22
    • 4544239810 scopus 로고    scopus 로고
    • AskStrider: What has changed on my machine lately?
    • [WR+04], Jan.
    • [WR+04] Yi-Min Wang, et al., "AskStrider: What Has Changed on My Machine Lately?", Microsoft Research Technical Report MSR-TR-2004-03, Jan. 2004.
    • (2004) Microsoft Research Technical Report , vol.MSR-TR-2004-03
    • Wang, Y.-M.1
  • 23
    • 33750584355 scopus 로고    scopus 로고
    • Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for spyware management
    • [WRV+04], Nov.
    • [WRV+04] Yi-Min Wang, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management," in Proc. Usenix LISA, Nov. 2004.
    • (2004) Proc. Usenix LISA
    • Wang, Y.-M.1    Roussev, R.2    Verbowski, C.3    Johnson, A.4
  • 24
    • 77952114571 scopus 로고    scopus 로고
    • STRIDER: A black-box, state-based approach to change and configuration management and support
    • [WVD+03], October
    • [WVD+03] Yi-Min Wang, et al., "STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support," Proc. Usenix Large Installation Systems Administration (LISA) Conference, pp. 159-171, October 2003.
    • (2003) Proc. Usenix Large Installation Systems Administration (LISA) Conference , pp. 159-171
    • Wang, Y.-M.1
  • 25
    • 27544452676 scopus 로고    scopus 로고
    • Persistent-state checkpoint comparison for troubleshooting configuration failures
    • [WVS03], June
    • [WVS03] Yi-Min Wang, Chad Verbowski, and Daniel R. Simon, "Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures", in Proc. IEEE DSN, June 2003.
    • (2003) Proc. IEEE DSN
    • Wang, Y.-M.1    Verbowski, C.2    Simon, D.R.3
  • 26
    • 33845390072 scopus 로고    scopus 로고
    • Strider GhostBuster: Why it's a bad idea for stealth software to hide files
    • [WVR+04], July
    • [WVR+04] Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files," Microsoft Research Technical Report MSR-TR-2004-71, July 2004.
    • (2004) Microsoft Research Technical Report , vol.MSR-TR-2004-71
    • Wang, Y.-M.1    Vo, B.2    Roussev, R.3    Verbowski, C.4    Johnson, A.5
  • 27
    • 84861259069 scopus 로고    scopus 로고
    • [XA04], (DOS attacks), April
    • [XA04] "Alarm growing over bot software," (DOS attacks), CNET News.com, http://news.zdnet.com/2100-1009_22-5202236.html, April 2004.
    • (2004) Alarm Growing over Bot Software
  • 28
    • 33244482268 scopus 로고    scopus 로고
    • Guilty plea in Kinko's keystroke caper
    • [XG03], (stealing online banking passwords), July 18
    • [XG03] "Guilty Plea in Kinko's Keystroke Caper," (stealing online banking passwords), Security Focus, July 18, 2003.
    • (2003) Security Focus
  • 29
    • 27544500259 scopus 로고    scopus 로고
    • Gone flushing: Web scam takes dangerous turn
    • [XG04], (stealing online banking passwords), May 27
    • [XG04] "Gone Flushing: Web Scam Takes Dangerous Turn," (stealing online banking passwords), Wall Street Journal, May 27, 2004.
    • (2004) Wall Street Journal
  • 31
    • 84861268772 scopus 로고    scopus 로고
    • [XP04], (phishing), The Register, Nov. 26
    • [XP04] "Phishers tapping botnets to automate attacks", (phishing), The Register, http://www.theregister.co.uk/2004/11/26/anti- phishing_report/, Nov. 26, 2004.
    • (2004) Phishers Tapping Botnets to Automate Attacks
  • 32
    • 27544491863 scopus 로고    scopus 로고
    • Spreading web virus aims to steal financial data
    • [XS04], June 25
    • [XS04] "Spreading Web Virus Aims to Steal Financial Data," Reuters, June 25, 2004.
    • (2004) Reuters
  • 33
    • 84861264553 scopus 로고    scopus 로고
    • [XW04], (dialers, spamming), The Register, Dec.
    • [XW04] "White collar virus writers make cash from chaos," (dialers, spamming), The Register, http://www.theregister.co.uk/2004/12/07/ sophos_av_review_2004/, Dec. 2004.
    • (2004) White Collar Virus Writers Make Cash from Chaos
  • 34
    • 27544469994 scopus 로고    scopus 로고
    • [XZ04], PC World, July
    • [XZ04] "Zombie PCs: Silent, Growing Threat," PC World, http://www.pcworld.com/news/article/0,aid,116841,00.asp, July 2004.
    • (2004) Zombie PCs: Silent, Growing Threat
  • 35
    • 84861264742 scopus 로고    scopus 로고
    • An overview of unix rootkits
    • [YA03], iDefense Labs, February
    • [YA03] A. Chuvakin, "An Overview of Unix Rootkits," iALERT White Paper, iDefense Labs, http://www.megasecurity.org/papers/Rootkits.pdf, February 2003.
    • (2003) iALERT White Paper
    • Chuvakin, A.1
  • 36
    • 84861264922 scopus 로고    scopus 로고
    • [YB]
    • [YB] BIOS and Flash Utilities, http://h20000.www2.hp.com/bizsupport/ TechSupport/DriverDownload.jsp?pnameOID=100870&locale=en_US&taskId=135 &refresh=true&prodTypeld= 12454&prodSeriesId=96495&sw-EnvOID= 1093#2663.
    • BIOS and Flash Utilities
  • 39
    • 84861258764 scopus 로고    scopus 로고
    • Nasty new parasite
    • [YC04], (stealth spyware), June 8
    • [YC04] "Nasty New Parasite," (stealth spyware), Spyware Weekly Newsletter, http://www.spywareinfo.com/newsletter/archives/0604/8.php, June 8, 2004.
    • (2004) Spyware Weekly Newsletter
  • 41
    • 84861263050 scopus 로고    scopus 로고
    • [YH]
    • [YH] Hidden Registry Keys, http//www.sysinternals.com/ntw2k/info/tips. shtml#registryhidden.
    • Hidden Registry Keys
  • 42
  • 48
    • 84872311782 scopus 로고    scopus 로고
    • Linux on-the-fly kernel patching without LKM
    • [YL01], Dec.
    • [YL01] "Linux on-the-fly kernel patching without LKM", http://www.phrack.org/phrack/58/p58-0x07, Phrack Magazine, Dec. 2001.
    • (2001) Phrack Magazine
  • 49
    • 27544461585 scopus 로고    scopus 로고
    • NTIllusion - A portable Win32 userland rootkit.txt
    • [YN04], July 13
    • [YN04] "NTIllusion - A portable Win32 userland rootkit.txt," Phrack Magazine, July 13, 2004.
    • (2004) Phrack Magazine
  • 50
    • 84861257279 scopus 로고    scopus 로고
    • [YO03] OpioN, March
    • [YO03] OpioN, "Kernel Rootkits Explained", http://www.ebcvg. com/articles.php?id=124, March 2003.
    • (2003) Kernel Rootkits Explained
  • 52
    • 84861259145 scopus 로고    scopus 로고
    • [YV04]
    • [YV04] VICE - Catch the hookers! http://www.blackhat.com/presentations/ bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf.
    • VICE - Catch the Hookers!
  • 53
    • 84855862111 scopus 로고    scopus 로고
    • Weakening the linux kernel
    • [YW98], Jan.
    • [YW98] "Weakening the Linux Kernel," Phrack Magazine, http://www.phrack.org/phrack/52/P52-18, Jan. 1998.
    • (1998) Phrack Magazine
  • 54
    • 84861258948 scopus 로고    scopus 로고
    • [ZA]
    • [ZA] API Hook SDK 2.12, http://www.devarchive.com/fl709.html.
    • API Hook SDK 2.12
  • 57
    • 84861264926 scopus 로고    scopus 로고
    • [ZB] Berbew
    • [ZB] Berbew, http://securityresponse.symantec.com/avcenter/venc/data/ backdoor.berbew.j.html.
  • 58
    • 84861270917 scopus 로고    scopus 로고
    • [ZD]
    • [ZD] Darkside rootkit, http://www.antiserver.it/backdoor-rootkit/.
    • Darkside Rootkit
  • 60
    • 84880390547 scopus 로고    scopus 로고
    • [ZFU]
    • [ZFU] The FU Rootkit, http://www.rootkit.com/vault/fuzen_op/FU_Rootkit. zip.
    • The FU Rootkit
  • 61
    • 84861264925 scopus 로고    scopus 로고
    • [ZH]
    • [ZH] Hacker Defender, http://rootkit.host.sk/.
    • Defender, H.1
  • 62
    • 84861265047 scopus 로고    scopus 로고
    • [ZHF]
    • [ZHF] Hide Files 3.3, http://www.tomdownload.com/new_add/new20031128/ hide_files_folders.htm.
    • Hide Files 3.3
  • 63
    • 84861260311 scopus 로고    scopus 로고
    • [ZHO]
    • [ZHO] Hide Folders XP, http://www.fspro.net/downloads.html.
    • Hide Folders XP
  • 64
    • 84861255609 scopus 로고    scopus 로고
    • [ZK]
    • [ZK] Knark LKM-rootkit, http://www.sans.org/resources/idfaq/knark.php.
    • Knark LKM-rootkit
  • 66
    • 84861264289 scopus 로고    scopus 로고
    • [ZR] RootKits
    • [ZR] RootKits, http://www.rootkit.com/.
  • 67
    • 84861256750 scopus 로고    scopus 로고
    • [ZS]
    • [ZS] Superkit rootkit, http://www.remoteassessment.com/darchive/ 191006794.html.
    • Superkit Rootkit
  • 68
    • 84861258650 scopus 로고    scopus 로고
    • [ZT]
    • [ZT] The T0rnkit rootkit, http://www.europe.f-secure.com/vdescs/tom. shtml.
    • The T0rnkit Rootkit
  • 69
    • 84861265151 scopus 로고    scopus 로고
    • [ZU]
    • [ZU] The Urbin Trojan, http://vil.nai.com/vil/content/v_125663.htm.
    • The Urbin Trojan
  • 70
    • 84861267420 scopus 로고    scopus 로고
    • [ZV]
    • [ZV] Vanquish, https://www.rootkit.com/project.phD?id=9.
    • Vanquish
  • 71
    • 84861261086 scopus 로고    scopus 로고
    • [ZVI]
    • [ZVI] Vice, http://www.rootkjt.com/project.php?id=20.
    • Vice


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.