Windows XP is the dominant operating system in the world today and rootkits have been a major concern for XP users. This paper provides an in-depth analysis of the rootkits that target that operating system, while focusing on those that use various hooking techniques to hide malware on a machine. We identify some of the weaknesses in the Windows XP architecture that rootkits exploit and then evaluate some of the anti-rootkit security features that Microsoft has unveiled in Vista and 7. To reduce the number of rootkit infections in the future, we suggest that Microsoft should take full advantage of Intel's four distinct privilege levels. © 2010 IEEE
Dr. R. Raines (Member) date AFIT/GCE/ENG/07-10 In today’s world of advanced computing power at the f...
Rootkits refer to software that is used to hide the presence of malware from system/network administ...
Rootkits refer to software that is used to hide the presence and activity of malware and permit an a...
Statistics show that although malware detection techniques are detecting and preventing malware, the...
Statistics show that although malware detection techniques are detecting and preventing malware, the...
M.Sc.Anyone who uses a computer for work or recreational purposes has come across one or all of the ...
M.Sc.Anyone who uses a computer for work or recreational purposes has come across one or all of the ...
Rootkits are a special class of software whose goal is to gain and maintain a high level of privileg...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
АbstractA rootkit is a collection of computer software, typically malicious, that has the intention ...
Kernel rootkits are a special category of malware that are deployed directly in the kernel and hence...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
Dr. R. Raines (Member) date AFIT/GCE/ENG/07-10 In today’s world of advanced computing power at the f...
Rootkits refer to software that is used to hide the presence of malware from system/network administ...
Rootkits refer to software that is used to hide the presence and activity of malware and permit an a...
Statistics show that although malware detection techniques are detecting and preventing malware, the...
Statistics show that although malware detection techniques are detecting and preventing malware, the...
M.Sc.Anyone who uses a computer for work or recreational purposes has come across one or all of the ...
M.Sc.Anyone who uses a computer for work or recreational purposes has come across one or all of the ...
Rootkits are a special class of software whose goal is to gain and maintain a high level of privileg...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
Rootkits are a type of malware that attempt to hide their presence on a system, typically by comprom...
АbstractA rootkit is a collection of computer software, typically malicious, that has the intention ...
Kernel rootkits are a special category of malware that are deployed directly in the kernel and hence...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
The emergence of hardware virtualization technology has led to the development of OS independent mal...
Dr. R. Raines (Member) date AFIT/GCE/ENG/07-10 In today’s world of advanced computing power at the f...
Rootkits refer to software that is used to hide the presence of malware from system/network administ...
Rootkits refer to software that is used to hide the presence and activity of malware and permit an a...