[1] |
中国互联网信息中心.第 44 次中国互联网发展状况统计报告[R]. 北京:中国网信网, 2018.
|
|
China Internet Network Information Center. The 44th statistical report on the development of China’s Internet[R]. Beijing:Cyberspace Administration of China, 2018.
|
[2] |
KRUEGEL C , ROBERTSON W , VIGNA G . Detecting kernel-level rootkits through binary analysis[C]// Proceedings of Computer Security Applications Conference. Piscataway:IEEE Press, 2004: 91-100.
|
[3] |
张瑜, 刘庆中, 李涛 ,等. Rootkit研究综述[J]. 电子科技大学学报, 2015(4): 563-578.
|
|
ZHANG Y , LIU Q Z , LI T ,et al. Research and development of Rootkit[J]. Journal of University of Electronic Science and Technology of China, 2015(4): 563-578.
|
[4] |
FU D S , CAO C L . A windows rootkit detection method based on cross-View[J]. Information Technology, 2010(2): 1-3.
|
[5] |
白光冬, 郭耀, 陈向群 . 一种基于交叉视图的 Windows Rootkit检测方法[J]. 计算机科学, 2009,36(8): 133-137.
|
|
BAI G D , GUO Y , CHEN X Q . Windows rootkit detection method based on cross-view[J]. Computer Science, 2009,36(8): 133-137.
|
[6] |
陈晓苏, 黄文超, 肖道举 . 一种基于交叉视图的 Windows Rootkit检测方法[J]. 计算机工程与科学, 2007,29(7): 1-3.
|
|
CHEN X S , HUANG W C , XIAO D J . A Windows rootkit detection method based on cross-view[J]. Computer Engineering&Science, 2007,29(7): 1-3.
|
[7] |
LEVINE J G , GRIZZARD J B , OWEN H . A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table[C]// Proceedings of Second IEEE International Information Assurance Workshop. Piscataway:IEEE Press, 2005: 107-125.
|
[8] |
KRUEGEL C , ROBERTSON W , VIGN G . Detecting kernel-level rootkits through binary analysis[C]// Computer Security Applications Conference. Piscataway:IEEE Press, 2004: 91-100.
|
[9] |
GARFINKEL T , ROSENBLUM M . A virtual machine introspection based architecture for intrusion detection[C]// Proceedings of Network and Distributed Systems Security Symposium. Piscataway:IEEE Press, 2003: 253-285.
|
[10] |
WANG Z , JIANG X , CUI W ,et al. Countering kernel rootkits with lightweight hook protection[C]// Proceedings of the 16th ACM Conference on Computer and Communications Security. New York:ACM Press, 2009: 545-554.
|
[11] |
田竞, 孙慧琪, 武希耀 ,等. 一种基于安全优先架构的细粒度可信监测度量方法[J]. 信息安全学报, 2019,4(5): 23-31.
|
|
TIAN J , SUN H Q , WU X Y ,et al. A fine-grained trusted monitoring measurement method based on security-first architecture[J]. Journal of Cyber Security, 2019,4(5): 23-31.
|
[12] |
LEE H , MOON H , HEO I ,et al. KI-Mon ARM:a hardware-assisted event-triggered monitoring platform for mutable kernel object[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(2): 287-300.
|
[13] |
仝青, 张铮, 张为华 ,等. 拟态防御Web服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[14] |
李卫超, 冯俊龙 . 动态异构冗余的Web威胁感知技术研究[J]. 智能计算机与应用, 2018,8(4): 42-46,52.
|
|
LI W C , FENG J L . Research on dynamic heterogeneity redundant Web threat awareness technology[J]. Intelligent Computer and Applications, 2018,8(4): 42-46,52.
|
[15] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|