[1] Nguyen, Reiher N, Kuenning P, et al. Detecting insider threats by monitoring system call activity . Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, 2003: 45-52.
[2] Iyer A, Ngo H Q. Towards a theory of insider threat assessment //Proceedings of the 2005 International Conference on Dependable Systems and Networks, 2005:108-117.
[3] Liu A, Martin C, Hetherington T, et al. A comparison of system call feature representations for insider threat detection . Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, 2005: 340-347.
[4] Yariv K. API Spying Techniques for Windows 9x, NT and 2000 . 2000 . http://www.internals.com/articles/apispy/apispy.htm.
[5] Jeffrey R. Windows核心编程 [M]. 北京:机械工业出版社,2000.
[6] Ivo I. API hooking revealed . 2002 . http://www.codeproject.com/system/hooksys.asp.
[7] Jeffrey R. Load your 32-bit DLL into another processs address space using INJLIB [J]. Microsoft Systems Journal, 1994, 9(5).
[8] Keith B. Windows安全性编程 [M]. 北京:中国电力出版社, 2004.
[9] Keith B. Security Briefs . Microsoft Systems Journal, 1999, 14(8) .http://www.microsoft.com/msj/0899/security/security0899.aspx.
[10] Robert K. Three ways to Inject Your Code into Another Process . (2006-07-02) http://www.codeguru.com/Cpp/W-P/system/processesmodules/article.php/c5767.
[11] Rattle. Using process infection to bypass Windows software firewalls phrack , 2004, 11: 62-0x0d .http://www.phrack.org/show.php?p=62&a=13.
[12] Matt P. Learn system-level Win32 coding techniques by writing and API spy program [J]. Microsoft systems Journal, 1994,9(12).
[13] Matt P. Under the Hood . Microsoft Systems Journal, 1997,12(9) .http://www.microsoft.com/msj/0997/hood0997.aspx.
[14] Holy_F. Technics of hooking API functions on Windows . 2002 .http://www.hxdef.org.
[15] Crazyload. Playing with Windows/dev/(k)mem [J]. Phrack, 2002,0x0b:p59-0x10.
[16] Hoglund G, Butler J. Rootkits-Windows内核的安全防护 [M]. 北京:清华大学出版社, 2007.
[17] Tan CK. Defeating Kernel Native API Hookers by Direct Service dispatch Table Restoration . Special Interest Group in Securtiy and Information Integrity(SIG^2), 2004-07-08 http://www.security.org.sg.
|