Browse > Article

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis  

Na, SangYeob (남서울대학교 컴퓨터학과)
Noh, SiChoon (남서울대학교 컴퓨터학과)
Publication Information
Abstract
Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.
Keywords
Backdoor Behavior; Diagnosis; Vulnerability; Defense Mechanism; Malicious Code;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Willam Stallings, "Network and Internetwork Security".Prentice Hall, 1995.
2 J.Hruska,"Computer Virus and Anti-virus Warfare" Ellis Horwood, 1992
3 P.Denning"Computer Under Attack Intruders, Worms, and Virus", Addison-Wesley,1990
4 F.Cohen,"A short Course on Computer Viruses". ASP Press, 1990 5 .1986.
5 Bruce Schneier, "Applies Cryptography", Wiley, Second Edition, 1996
6 OWASP, CSRF Guard, http://www.owasp.org/index.php/CSRF_Guard
7 David Gourley and Brian Totty, "HTTP: The Definitive Guide", O'Reilly Media, 2002.
8 SiChoon, Noh, Multi-Level Protection Building for Virus Protection Infrastructure, Springer Springer LNCS 3036,2004
9 SiChoon, Noh, Protection Structure Building for Mal icious Traf f ic Protect ing in Int ranet Systems,Springer LNCS 3981
10 Stepen Cost, An Introduction to SQL Injection Attacks,for Oracle develops, 2007.3
11 류재철(충남대학교), 악성코드의 새로운 보금자리 '스마트폰', 2011.06
12 김정녀, 스마트폰 보안 기술 동향 및 전망, 2010.11