Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2010, Vol. 27 ›› Issue (5): 695-703.DOI: 10.7523/j.issn.2095-6134.2010.5.018

• Research Articles • Previous Articles     Next Articles

Detection of the malicious code injection by hooking system calls in kernel mode

LI Wei1, SU Pu-Rui2   

  1. 1. Graduate University of the Chinese Academy of Sciences, Beijing 100049, China;
    2. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2009-12-24 Revised:2010-03-09 Online:2010-09-15

Abstract:

Based on detailed analyses of all the methods about runtime process injection and hooking techniques in Windows operating system, we propose a method for dynamically detecting malicious code using the kernel-mode driver. It is implemented as a driver that is able to dynamically monitor every process, report attacks to the user accurately, and enhance overall system security.The experimental results show that this method achieves satisfactory detection effects in performance and detection.

Key words: Hook technology, system service descriptor table(SSDT), system service table(SST)

CLC Number: