Taking a lesson from stealthy rootkits

被引:10
作者
Ring, S
Cole, E
机构
关键词
D O I
10.1109/MSP.2004.57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The techniques used by the developers to use rootkits and obfuscation approaches to build more quick, less-vulnerable software, are discussed. Obfuscation transforms software into an identically functioning - but unreadable - form, implemented in a high-level programming language, or, to some extent, in the compiled binary. A rootkit is a set of software tool that lets an attacker hide processes, files, and network connections. The experts view the increased integrated use of these approaches with the increase in the popularity of executable and linkable (ELF) parasitic and runtime viruses, mobile agents and Unix e-commerce software.
引用
收藏
页码:38 / 45
页数:8
相关论文
共 9 条
[1]  
CESARE S, ELF PARASITE VIRUSES
[2]  
CESARE S, 1998, RUNTIME KERNEL KMEM
[3]  
CHANG H, 2002, LNCS, V2320, P160
[4]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[5]  
Hoglund Greg, 2004, EXPLOITING SOFTWARE
[6]  
HORNE B, 2001, SECURITY PRIVACY DIG, V2320, P141
[7]  
JBTZHM, 2002, STATIC KERNEL PATCHI
[8]  
TRUFF, 2003, INFECT LOADABLE KERN
[9]  
2002, PHRACK