A Study on Polymorphic Windows Kernel Mode Rootkit
碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === More and more malicious programs are combined with rootkits to shield their illegal activities and the result makes security products face a challenge. It can be observed that most sophisticated kernel mode rootkits are implemented to execute hiding tasks through...
Main Authors: | Yuh-Chen Chen, 陳昱成 |
---|---|
Other Authors: | Woei-Jiunn Tsaur |
Format: | Others |
Language: | en_US |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/92312229637569799284 |
Similar Items
-
An Effective Scheme for Protecting against Windows Kernel-mode Rootkits
by: SHI-JIA Lin, et al.
Published: (2010) -
A Study on Effective Technology for Detecting Windows Kernel Mode Rootkits
by: Being-Yu Tsai, et al.
Published: (2009) -
A Study on Metamorphic Linux Kernel Mode Rootkit
by: Chun-Hao Huang, et al.
Published: (2006) -
An Efficient Solution for Hook-Based Kernel Level Rootkits
by: Hsing, Chieh, et al.
Published: (2009) -
Windows Rootkits Detection Technologies for Service Platforms in Cloud Computing
by: Huang, Yihsi, et al.
Published: (2011)