DocumentCode :
1065651
Title :
Taking a lesson from stealthy rootkits
Author :
Ring, Sandra ; Cole, Eric
Volume :
2
Issue :
4
fYear :
2004
Firstpage :
38
Lastpage :
45
Abstract :
Attackers use rootkits and obfuscation techniques to hide while covertly extracting information from commercial applications. The authors describe how developers can use similar obfuscation approaches to build more agile, less vulnerable software. Obfuscation deliberately transforms software into an identically functioning, but purposefully unreadable form, implemented in a high-level programming language at the machine-instruction level, or, to some extent, in the compiled binary. Obfuscation´s only requirement is that its generated code be functionally equivalent to its parent.
Keywords :
computer crime; software engineering; agile software development; commercial applications; compiled binary; obfuscation techniques; stealthy rootkits; unreadable software; Application software; Computer networks; Computer security; Data mining; Forensics; Information security; Kernel; Linux; Privacy; Reverse engineering; 65; malicious code; reverse engineering; rootkits; software obfuscation;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2004.57
Filename :
1324597
Link To Document :
بازگشت