Rootkits survey: a concealment story

Computer security is an old problem, as old as
computers themselves. The evolution of computer threats has
also experienced an exponential complexity development, being
the last example of that evolution the malware categorized as
rootkits or stealth malware. A rootkit is code that is used by an
attacker to keep the legitimate users and administrators of a
system unaware of the code, and thus the attacker’s presence
on the compromised system. This paper will discuss the history
of rootkits from the basic modification of system binaries to the
cutting edge research being develop today. A discussion of each
type of rootkit will be followed by an overview of rootkit
detection techniques and how to know when a rootkit has been
deployed. Finally new techniques and research directions will
be discussed.

Download: Survey

Advertisements
Tagged with:
Posted in publications

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

In Archive
%d bloggers like this: