dc.contributor.author | Lobo, D | |
dc.contributor.author | Watters, P | |
dc.contributor.author | Wu, XW | |
dc.contributor.author | Sun, L | |
dc.contributor.editor | Lisa O'Connor | |
dc.date.accessioned | 2017-05-03T11:48:53Z | |
dc.date.available | 2017-05-03T11:48:53Z | |
dc.date.issued | 2010 | |
dc.date.modified | 2011-06-20T06:48:48Z | |
dc.identifier.isbn | 9780769541860 | |
dc.identifier.doi | 10.1109/CTC.2010.9 | |
dc.identifier.uri | http://hdl.handle.net/10072/37830 | |
dc.description.abstract | Windows XP is the dominant operating system in the world today and root kits have been a major concern for XP users. This paper provides an in-depth analysis of the root kits that target that operating system, while focusing on those that use various hooking techniques to hide malware on a machine. We identify some of the weaknesses in the Windows XP architecture that root kits exploit and then evaluate some of the anti-root kit security features that Microsoft has unveiled in Vista and 7. To reduce the number of root kit infections in the future, we suggest that Microsoft should take full advantage of Intel's four distinct privilege levels. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 344167 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.publisher.place | United States | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | Second Cybercrime and Trustworthy Computing Workshop (CTC 2010) | |
dc.relation.ispartofconferencetitle | Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010 | |
dc.relation.ispartofdatefrom | 2010-07-19 | |
dc.relation.ispartofdateto | 2010-07-20 | |
dc.relation.ispartoflocation | Ballarat | |
dc.relation.ispartofpagefrom | 69 | |
dc.relation.ispartofpageto | 78 | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Cybersecurity and privacy not elsewhere classified | |
dc.subject.fieldofresearchcode | 460499 | |
dc.title | Windows Rootkits: Attacks and Countermeasures | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.rights.copyright | © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
gro.date.issued | 2010 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Wu, Xin-Wen | |