Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen
{"title":"Research and practice on the cooperative concealing technology of Trojan horses","authors":"Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen","doi":"10.1109/ICNDS.2010.5479153","DOIUrl":null,"url":null,"abstract":"Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.