PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: barber

Detecting kernel rootkits - Dartmouth Computer Science

Detecting kernel rootkitsAshwin RamaswamyDepartment of Computer ScienceDartmouth CollegeMasters Thesis ProposalDartmouth Computer Science Technical Report TR2008-627 Proposal Presentation Date: 2 September, 2008 AbstractKernel rootkits are a special category of malware that are deployed directly in thekernel and hence have unmitigated reign over the functionalities of the kernel seek to detect such rootkits that are deployed in the real world by first observinghow the majority of kernel rootkits operate. To this end, comparable to how rootkitsfunction in the real world, we write our own kernel rootkit that manipulates the networkdriver, thus giving us control over all packets sent into the then implement a mechanism to thwart the attacks of such rootkits by noticingthat a large number of the rootkits deployed today rely heavily on the redirection offunction pointers within the kernel .

Detecting kernel rootkits Ashwin Ramaswamy Department of Computer Science Dartmouth College ... Windows rootkits usually utilize the Direct Kernel Object Manipulation (DKOM) ... by our colleagues in attacking networked set-top boxes widely deployed across campus [6]. 4.

Tags:

  Windows, Detecting, Kernel, Attacking, Rootkit, Detecting kernel rootkits

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Detecting kernel rootkits - Dartmouth Computer Science

Related search queries