Title :
How Not to Be Seen
Author :
Ford, Richard ; Allen, William H.
Author_Institution :
Florida Inst. of Technol., Melbourne, FL
Abstract :
The concept of stealth - as it pertains to computers - shares a great deal with its real-world counterpart. In this article, we take a look at stealth from both a historical and a technological perspective. This is a hugely important topic, for if an unwanted computer program can´t be seen, it can´t be eliminated. In addition, software developers - especially security software developers - must have a solid understanding of what can be trusted in an environment - and what can´t. When it comes to deception, stealth is the state of the art
Keywords :
computer crime; invasive software; software engineering; operating systems; security software development; unwanted computer program; Computer hacking; Computer security; Computer viruses; Hardware; Kernel; Operating systems; Privacy; Protection; Viruses (medical); active deception; malware; passive deception; software stealth;
Journal_Title :
Security & Privacy, IEEE