Show simple item record

dc.contributor.authorLobo, D
dc.contributor.authorWatters, P
dc.contributor.authorWu, XW
dc.contributor.authorSun, L
dc.contributor.editorLisa O'Connor
dc.date.accessioned2017-05-03T11:48:53Z
dc.date.available2017-05-03T11:48:53Z
dc.date.issued2010
dc.date.modified2011-06-20T06:48:48Z
dc.identifier.isbn9780769541860
dc.identifier.doi10.1109/CTC.2010.9
dc.identifier.urihttp://hdl.handle.net/10072/37830
dc.description.abstractWindows XP is the dominant operating system in the world today and root kits have been a major concern for XP users. This paper provides an in-depth analysis of the root kits that target that operating system, while focusing on those that use various hooking techniques to hide malware on a machine. We identify some of the weaknesses in the Windows XP architecture that root kits exploit and then evaluate some of the anti-root kit security features that Microsoft has unveiled in Vista and 7. To reduce the number of root kit infections in the future, we suggest that Microsoft should take full advantage of Intel's four distinct privilege levels.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent344167 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placeUnited States
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencenameSecond Cybercrime and Trustworthy Computing Workshop (CTC 2010)
dc.relation.ispartofconferencetitleProceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010
dc.relation.ispartofdatefrom2010-07-19
dc.relation.ispartofdateto2010-07-20
dc.relation.ispartoflocationBallarat
dc.relation.ispartofpagefrom69
dc.relation.ispartofpageto78
dc.rights.retentionY
dc.subject.fieldofresearchCybersecurity and privacy not elsewhere classified
dc.subject.fieldofresearchcode460499
dc.titleWindows Rootkits: Attacks and Countermeasures
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.rights.copyright© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
gro.date.issued2010
gro.hasfulltextFull Text
gro.griffith.authorWu, Xin-Wen


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record