Implementing rootkits to address operating system vulnerabilities

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Corregedor, Manuel
dc.contributor.author Von Solms, Sebastiaan
dc.date.accessioned 2012-11-14T19:26:44Z
dc.date.available 2012-11-14T19:26:44Z
dc.date.issued 2011
dc.identifier.citation Corregedor M. & Von Solms, S. 2011. Implementing rootkits to address operating system vulnerabilities. Information Security for South Africa (ISSA 2011) Conference, 15-17 August 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa. en_US
dc.identifier.isbn 978-1-4577-1482-5
dc.identifier.uri http://hdl.handle.net/10210/8205
dc.description.abstract Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.rights © IEEE. 2011. Available online at http://icsa.cs.up.ac.za/issa/2011/Proceedings.htm. en_US
dc.subject Computer security en_US
dc.subject Rootkits en_US
dc.subject Operating systems - Security measures en_US
dc.subject Malware (Computer software) en_US
dc.title Implementing rootkits to address operating system vulnerabilities en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UJDigispace


Advanced Search

Browse

My Account