Journal of Applied Sciences ›› 2022, Vol. 40 ›› Issue (1): 61-68.doi: 10.3969/j.issn.0255-8297.2022.01.006

• Special Issue on Computer Applications • Previous Articles     Next Articles

Deep-Level Kernel Hook Mining Algorithm and Its Application in Software Security

LU Dengkai1, YU Yongbin2, YU Wenjian2, TANG Qian2, LIANG Shouyi3   

  1. 1. Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen 518110, China;
    2. College of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China;
    3. Department of Statistics, University of Kentucky, Kentucky 40506, United States of America
  • Received:2021-07-26 Online:2022-01-28 Published:2022-01-28

Abstract: This paper studies the protection principle of kernel hooks in the Windows operating system and proposes a deep-level kernel hook mining algorithm to solve the shortcomings of the interactive disassembler professional (IDA) cross-reference function. Firstly, the algorithm is used to dig out the internal calls of specified kernel functions and all the called positions of the kernel functions containing hooks. Then, we use Python to write mining algorithms based on the principle of function calls. Finally, we use C++ to write a driver program for passing-protection experiment. The performance of overprotection experiment is successful, which proves the effectiveness of the mining algorithm and the comprehensiveness of mining results.

Key words: kernel hook, mining algorithm, call instruction, kernel security, software security

CLC Number: