A Methodology To Characterize Kernel Level Rootkit Exploits That Overwrite The System Call Table

PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS(2004)

引用 13|浏览25
暂无评分
摘要
A cracker who gains access to a computer system will normally install some method, for use at a later time that allows the cracker to come back onto the system with root privilege. One method that a cracker may use is the installation of a root kit on the compromised system. A kernel level rootkit will modify the underlying kernel of the installed operating system. The kernel controls everything that happens on a computer. We are developing a standardized methodology to characterize rootkits. The ability to characterize rootkits will provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. We propose new methods for characterizing kernel level rootkits. These methods may also be used in the detection of kernel rootkits.
更多
查看译文
关键词
computer crime, cracking, hacking, information assurance, rootkits, system compromise, trojan
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要