DocumentCode :
1089244
Title :
How Not to Be Seen
Author :
Ford, Richard ; Allen, William H.
Author_Institution :
Florida Inst. of Technol., Melbourne, FL
Volume :
5
Issue :
1
fYear :
2007
Firstpage :
67
Lastpage :
69
Abstract :
The concept of stealth - as it pertains to computers - shares a great deal with its real-world counterpart. In this article, we take a look at stealth from both a historical and a technological perspective. This is a hugely important topic, for if an unwanted computer program can´t be seen, it can´t be eliminated. In addition, software developers - especially security software developers - must have a solid understanding of what can be trusted in an environment - and what can´t. When it comes to deception, stealth is the state of the art
Keywords :
computer crime; invasive software; software engineering; operating systems; security software development; unwanted computer program; Computer hacking; Computer security; Computer viruses; Hardware; Kernel; Operating systems; Privacy; Protection; Viruses (medical); active deception; malware; passive deception; software stealth;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2007.8
Filename :
4085597
Link To Document :
بازگشت