Using low-cost RFID for Rootkit countermeasures
碩士 === 長庚大學 === 資訊管理學系 === 98 === Rootkit can automatically invade your system and install without asking (the computer user’s) permission. Rootkit is purposely hidden so it is difficult to detect. Anti-virus programs may not be able to remove the invading malware completely as Rootkit can be well h...
Main Authors: | Kai Lun Kan, 甘凱綸 |
---|---|
Other Authors: | K. C. Chang |
Format: | Others |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/26844489635538646755 |
Similar Items
-
Detection Hardware Virtual Machine Based Rootkits
by: I. U. Korkin, et al.
Published: (2010-03-01) -
A Methodology for Detecting and Classifying Rootkit Exploits
by: Levine, John G. (John Glenn)
Published: (2005) -
Discoverer- a realtime Rootkit detection system
by: Yu-chan Lin, et al.
Published: (2012) -
Utilizing rootkits to address the vulnerabilities exploited by malware
by: Corregedor, Manuel Rodrigues
Published: (2012) -
Reinforcing the Defense against Rootkit-based Malicious Software in Cloud Computing Environment
by: Wei-Lun Lai, et al.
Published: (2013)