Kernel mode Rootkit detection method based on system virtualization technology
A technology of virtualization technology and detection method, which is applied in the field of rootkit detection technology in the kernel state, can solve problems such as failure of detection tools, and achieve the effect of ensuring authenticity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the drawings.
[0026] The meanings of the English abbreviations in this article are as follows:
[0027] 1) Rootkit: Rootkit is a special kind of malicious software, its function is to hide itself and designated files, processes, network links and other information on the installation target. It is more common to see that Rootkit is generally related to Trojan horses, backdoors, etc. Used in conjunction with malicious programs. Rootkit modifies the system kernel by loading a special driver to achieve the purpose of hiding information.
[0028] 2) LKM (Linux Kernel Module): Linux kernel module refers to a program that can be dynamically loaded into the Linux system kernel.
[0029] 3) LKM Rootkit: refers to the rootkit that can be directly loaded into the Linux system kernel, that is, the kernel state rootkit.
[0030] 4) module_list: Module (driver) list, which records the information list of all modules...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com