Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen
{"title":"木马协同隐藏技术的研究与实践","authors":"Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen","doi":"10.1109/ICNDS.2010.5479153","DOIUrl":null,"url":null,"abstract":"Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Research and practice on the cooperative concealing technology of Trojan horses\",\"authors\":\"Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen\",\"doi\":\"10.1109/ICNDS.2010.5479153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.\",\"PeriodicalId\":403283,\"journal\":{\"name\":\"2010 International Conference on Networking and Digital Society\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Networking and Digital Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNDS.2010.5479153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research and practice on the cooperative concealing technology of Trojan horses
Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.