DocumentCode
3423237
Title
Implementing rootkits to address operating system vulnerabilities
Author
Corregedor, Manuel ; Von Solms, Sebastiaan
Author_Institution
Acad. of Comput. Sci. & Software Eng., Univ. of Johannesburg, Johannesburg, South Africa
fYear
2011
fDate
15-17 Aug. 2011
Firstpage
1
Lastpage
8
Abstract
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques.
Keywords
invasive software; operating systems (computers); malware detection techniques; malware prevention; operating system vulnerabilities; rootkits implementation; steal information; Rootkits; malware; security; vulnerabilities;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security South Africa (ISSA), 2011
Conference_Location
Johannesburg
Print_ISBN
978-1-4577-1481-8
Type
conf
DOI
10.1109/ISSA.2011.6027521
Filename
6027521
Link To Document