面向Windows平臺的樣本對抗研究
電子技術(shù)應用
莫施文,沙樂天,潘家曄
南京郵電大學
摘要: 隨著網(wǎng)絡(luò)攻擊技術(shù)的不斷演進,針對企業(yè)和組織的高級持續(xù)性威脅(APT)攻擊愈演愈烈。APT攻擊的成功與否,很大程度上依賴于后滲透階段的執(zhí)行質(zhì)量,在該階段,攻擊者利用復雜的對抗技術(shù)實現(xiàn)持久控制和數(shù)據(jù)竊取。圍繞后滲透中的對抗技術(shù)展開,探討了Bootkit、COM接口濫用、BYOVD、VEILP7等對抗技術(shù),提出了一種新的對抗框架,并通過實驗展示了其在多個反病毒工具中的對抗能力以及相對于現(xiàn)有對抗工具的優(yōu)勢,并針對該框架提出相應的對抗策略,旨在推動對抗技術(shù)的研究和防御機制的優(yōu)化。
中圖分類號:TP393.08 文獻標志碼:A DOI: 10.16157/j.issn.0258-7998.256460
中文引用格式: 莫施文,沙樂天,潘家曄. 面向Windows平臺的樣本對抗研究[J]. 電子技術(shù)應用,2025,51(10):52-57.
英文引用格式: Mo Shiwen,Sha Letian,Pan Jiaye. Adversarial research on malware samples for the Windows platform[J]. Application of Electronic Technique,2025,51(10):52-57.
中文引用格式: 莫施文,沙樂天,潘家曄. 面向Windows平臺的樣本對抗研究[J]. 電子技術(shù)應用,2025,51(10):52-57.
英文引用格式: Mo Shiwen,Sha Letian,Pan Jiaye. Adversarial research on malware samples for the Windows platform[J]. Application of Electronic Technique,2025,51(10):52-57.
Adversarial research on malware samples for the Windows platform
Mo Shiwen,Sha Letian,Pan Jiaye
Nanjing University of Posts and Telecommunications
Abstract: With the continuous evolution of cyberattack technologies, Advanced Persistent Threats (APT) targeting enterprises and organizations have become increasingly prevalent. The success of APT attacks largely depends on the execution quality during the post-exploitation phase, where attackers use sophisticated adversarial techniques to maintain persistent control and exfiltrate data. This paper focuses on adversarial techniques in the post-exploitation phase, discussing technologies such as Bootkit, COM Interface Abuse, BYOVD, and VEIL7, and introduces a new adversarial framework. Through experiments, the paper demonstrates its bypass capabilities against multiple antivirus tools, as well as its advantages over existing adversarial tools. Additionally, corresponding defense strategies for this framework are proposed to advance research on countermeasure techniques and optimize defense mechanisms.
Key words : APT attacks;adversarial techniques;Bootkit;COM interface exploitation;vulnerable driver
引言
近年來,隨著網(wǎng)絡(luò)攻擊技術(shù)的不斷演進,針對企業(yè)和組織的高級持續(xù)性威脅(Advanced Persistent Threat,APT)攻擊愈演愈烈。APT攻擊的成功與否,很大程度上依賴于后滲透階段的執(zhí)行質(zhì)量,在后滲透階段,攻擊者利用復雜的對抗技術(shù)實現(xiàn)持久控制和數(shù)據(jù)竊取,然而,當前的防御系統(tǒng)在面對多種對抗技術(shù)時仍存在不足,如早期啟動過程時的對抗,惡意利用合法接口和合法驅(qū)動時的對抗,多層級定制化框架時的對抗。本文提出了一種面向Windows平臺的對抗框架,并測試其在實際對抗中的效果、效率,并對比同類軟件,該框架展現(xiàn)出高對抗成功率、高執(zhí)行效率以及更強的適用性,最后提出了針對該框架的應對策略,旨在推動對抗技術(shù)的研究和防御機制的優(yōu)化。
本文詳細內(nèi)容請下載:
http://www.ihrv.cn/resource/share/2000006806
作者信息:
莫施文,沙樂天,潘家曄
(南京郵電大學,江蘇 南京 210023)

此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。
