Taking a Lesson from Stealthy Rootkits

  • Authors:
  • Sandra Ring;Eric Cole

  • Affiliations:
  • The Sytex Group;The Sytex Group

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Attackers' obfuscation techniques make it difficult to detect kernel rootkits merely by looking at symbol-table information. The authors show how software developers can use obfuscation techniques to fight commercial-software reverse engineering and illegal distribution of their products by attackers.