面向Windows平臺的樣本對抗研究
電子技術應用
莫施文,沙樂天,潘家曄
南京郵電大學
摘要: 隨著網絡攻擊技術的不斷演進,針對企業和組織的高級持續性威脅(APT)攻擊愈演愈烈。APT攻擊的成功與否,很大程度上依賴于后滲透階段的執行質量,在該階段,攻擊者利用復雜的對抗技術實現持久控制和數據竊取。圍繞后滲透中的對抗技術展開,探討了Bootkit、COM接口濫用、BYOVD、VEILP7等對抗技術,提出了一種新的對抗框架,并通過實驗展示了其在多個反病毒工具中的對抗能力以及相對于現有對抗工具的優勢,并針對該框架提出相應的對抗策略,旨在推動對抗技術的研究和防御機制的優化。
中圖分類號:TP393.08 文獻標志碼:A DOI: 10.16157/j.issn.0258-7998.256460
中文引用格式: 莫施文,沙樂天,潘家曄. 面向Windows平臺的樣本對抗研究[J]. 電子技術應用,2025,51(10):52-57.
英文引用格式: Mo Shiwen,Sha Letian,Pan Jiaye. Adversarial research on malware samples for the Windows platform[J]. Application of Electronic Technique,2025,51(10):52-57.
中文引用格式: 莫施文,沙樂天,潘家曄. 面向Windows平臺的樣本對抗研究[J]. 電子技術應用,2025,51(10):52-57.
英文引用格式: Mo Shiwen,Sha Letian,Pan Jiaye. Adversarial research on malware samples for the Windows platform[J]. Application of Electronic Technique,2025,51(10):52-57.
Adversarial research on malware samples for the Windows platform
Mo Shiwen,Sha Letian,Pan Jiaye
Nanjing University of Posts and Telecommunications
Abstract: With the continuous evolution of cyberattack technologies, Advanced Persistent Threats (APT) targeting enterprises and organizations have become increasingly prevalent. The success of APT attacks largely depends on the execution quality during the post-exploitation phase, where attackers use sophisticated adversarial techniques to maintain persistent control and exfiltrate data. This paper focuses on adversarial techniques in the post-exploitation phase, discussing technologies such as Bootkit, COM Interface Abuse, BYOVD, and VEIL7, and introduces a new adversarial framework. Through experiments, the paper demonstrates its bypass capabilities against multiple antivirus tools, as well as its advantages over existing adversarial tools. Additionally, corresponding defense strategies for this framework are proposed to advance research on countermeasure techniques and optimize defense mechanisms.
Key words : APT attacks;adversarial techniques;Bootkit;COM interface exploitation;vulnerable driver
引言
近年來,隨著網絡攻擊技術的不斷演進,針對企業和組織的高級持續性威脅(Advanced Persistent Threat,APT)攻擊愈演愈烈。APT攻擊的成功與否,很大程度上依賴于后滲透階段的執行質量,在后滲透階段,攻擊者利用復雜的對抗技術實現持久控制和數據竊取,然而,當前的防御系統在面對多種對抗技術時仍存在不足,如早期啟動過程時的對抗,惡意利用合法接口和合法驅動時的對抗,多層級定制化框架時的對抗。本文提出了一種面向Windows平臺的對抗框架,并測試其在實際對抗中的效果、效率,并對比同類軟件,該框架展現出高對抗成功率、高執行效率以及更強的適用性,最后提出了針對該框架的應對策略,旨在推動對抗技術的研究和防御機制的優化。
本文詳細內容請下載:
http://m.jysgc.com/resource/share/2000006806
作者信息:
莫施文,沙樂天,潘家曄
(南京郵電大學,江蘇 南京 210023)

此內容為AET網站原創,未經授權禁止轉載。
