• DocumentCode
    1007730
  • Title

    How Not to Be Seen II: The Defenders Fight Back

  • Author

    Ford, Richard ; Allen, William H.

  • Author_Institution
    Florida Inst. of Technol., Melbourne
  • Volume
    5
  • Issue
    6
  • fYear
    2007
  • Firstpage
    65
  • Lastpage
    68
  • Abstract
    For pt.I see ibid., vol. 5, no.1, p.67-69 (2007). This article discusses about stealthy software-that is, software that manipulates a computer in some way to avoid some aspect of its operation. The stealth is divided up into roughly three categories: passive, hooking, and hypervisor-based stealth detection. Most stealth malware hides by hooking and redirecting system calls, either at the kernel or the operating system (OS) level.
  • Keywords
    computer viruses; hooking stealth; hypervisor-based stealth; operating system kernel; passive stealth; stealth malware detection; stealthy software; system calls redirection; well-defmed; Costs; Counting circuits; Kernel; Operating systems; Protection; Radio access networks; Security; Viruses (medical); Writing; basic training; hooking; passive; stealth software;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2007.166
  • Filename
    4402451