DocumentCode :
3423237
Title :
Implementing rootkits to address operating system vulnerabilities
Author :
Corregedor, Manuel ; Von Solms, Sebastiaan
Author_Institution :
Acad. of Comput. Sci. & Software Eng., Univ. of Johannesburg, Johannesburg, South Africa
fYear :
2011
fDate :
15-17 Aug. 2011
Firstpage :
1
Lastpage :
8
Abstract :
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques.
Keywords :
invasive software; operating systems (computers); malware detection techniques; malware prevention; operating system vulnerabilities; rootkits implementation; steal information; Rootkits; malware; security; vulnerabilities;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security South Africa (ISSA), 2011
Conference_Location :
Johannesburg
Print_ISBN :
978-1-4577-1481-8
Type :
conf
DOI :
10.1109/ISSA.2011.6027521
Filename :
6027521
Link To Document :
بازگشت