应用科学学报 ›› 2022, Vol. 40 ›› Issue (1): 61-68.doi: 10.3969/j.issn.0255-8297.2022.01.006

• 计算机应用专辑 • 上一篇    下一篇

深层内核钩子挖掘算法及其在软件安全中的应用

路登凯1, 于永斌2, 余文建2, 唐倩2, 梁守一3   

  1. 1. 电子科技大学(深圳) 高等研究院, 广东 深圳 518110;
    2. 电子科技大学 信息与软件工程学院, 四川 成都 610054;
    3. 肯塔基大学 统计系, 美国 肯塔基州 40506
  • 收稿日期:2021-07-26 出版日期:2022-01-28 发布日期:2022-01-28
  • 通信作者: 于永斌,副教授,研究方向为图像处理与自然语言处理。E-mail:ybyu@uestc.edu.cn E-mail:ybyu@uestc.edu.cn
  • 基金资助:
    国家自然科学基金国际青年科学家研究基金(No.61550110248);四川省科技厅重大科技专项基金(No.2019YFG0190)资助

Deep-Level Kernel Hook Mining Algorithm and Its Application in Software Security

LU Dengkai1, YU Yongbin2, YU Wenjian2, TANG Qian2, LIANG Shouyi3   

  1. 1. Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen 518110, China;
    2. College of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China;
    3. Department of Statistics, University of Kentucky, Kentucky 40506, United States of America
  • Received:2021-07-26 Online:2022-01-28 Published:2022-01-28

摘要: 研究了Windows操作系统中内核钩子的保护原理,并针对交互式反汇编器交叉引用功能的不足,提出了一种深层次内核钩子挖掘算法。首先用该算法挖掘出指定内核函数的内部调用以及包含钩子的内核函数的所有被调用位置,然后用Python编写基于函数调用原理的挖掘算法,最后用C++编写过保护实验的驱动程序。研究结果表明:过保护实验是成功的,证明了该挖掘算法的有效性和挖掘结果的全面性。

关键词: 内核钩子, 挖掘算法, 调用指令, 内核安全, 软件安全

Abstract: This paper studies the protection principle of kernel hooks in the Windows operating system and proposes a deep-level kernel hook mining algorithm to solve the shortcomings of the interactive disassembler professional (IDA) cross-reference function. Firstly, the algorithm is used to dig out the internal calls of specified kernel functions and all the called positions of the kernel functions containing hooks. Then, we use Python to write mining algorithms based on the principle of function calls. Finally, we use C++ to write a driver program for passing-protection experiment. The performance of overprotection experiment is successful, which proves the effectiveness of the mining algorithm and the comprehensiveness of mining results.

Key words: kernel hook, mining algorithm, call instruction, kernel security, software security

中图分类号: