Blog Archives

Proactive detection of kernel-mode rootkits

The sophistication of malicious software (malware) used to break the computer security has increased exponentially in the last years. Frequently, malware is hidden into a computer by software components called rootkits. Therefore, early detection of rootkits is of primary importance

Tagged with:
Posted in publications

Rootkits survey: a concealment story

Computer security is an old problem, as old as computers themselves. The evolution of computer threats has also experienced an exponential complexity development, being the last example of that evolution the malware categorized as rootkits or stealth malware. A rootkit

Tagged with:
Posted in publications
In Archive