• DocumentCode
    3423237
  • Title

    Implementing rootkits to address operating system vulnerabilities

  • Author

    Corregedor, Manuel ; Von Solms, Sebastiaan

  • Author_Institution
    Acad. of Comput. Sci. & Software Eng., Univ. of Johannesburg, Johannesburg, South Africa
  • fYear
    2011
  • fDate
    15-17 Aug. 2011
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques.
  • Keywords
    invasive software; operating systems (computers); malware detection techniques; malware prevention; operating system vulnerabilities; rootkits implementation; steal information; Rootkits; malware; security; vulnerabilities;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security South Africa (ISSA), 2011
  • Conference_Location
    Johannesburg
  • Print_ISBN
    978-1-4577-1481-8
  • Type

    conf

  • DOI
    10.1109/ISSA.2011.6027521
  • Filename
    6027521