DocumentCode
1007730
Title
How Not to Be Seen II: The Defenders Fight Back
Author
Ford, Richard ; Allen, William H.
Author_Institution
Florida Inst. of Technol., Melbourne
Volume
5
Issue
6
fYear
2007
Firstpage
65
Lastpage
68
Abstract
For pt.I see ibid., vol. 5, no.1, p.67-69 (2007). This article discusses about stealthy software-that is, software that manipulates a computer in some way to avoid some aspect of its operation. The stealth is divided up into roughly three categories: passive, hooking, and hypervisor-based stealth detection. Most stealth malware hides by hooking and redirecting system calls, either at the kernel or the operating system (OS) level.
Keywords
computer viruses; hooking stealth; hypervisor-based stealth; operating system kernel; passive stealth; stealth malware detection; stealthy software; system calls redirection; well-defmed; Costs; Counting circuits; Kernel; Operating systems; Protection; Radio access networks; Security; Viruses (medical); Writing; basic training; hooking; passive; stealth software;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2007.166
Filename
4402451
Link To Document