Automated containment of rootkits attacks
نویسندگان
چکیده
منابع مشابه
Automated containment of rootkits attacks
Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing malware to evade detection. In the absence of appropriate tools to counter such attacks, compromised machines stay undetected for extended periods of time. Leveraging virtual machine technology, we propose a sol...
متن کاملPaladin: Automated Detection and Containment of Rootkit Attacks
Rootkit attacks are a serious threat to computer systems. Packaged with other malware like worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing the malware to evade detection. In the absence of appropriate tools to counter such attacks, compromised machines stay undetected for extended periods of time. Leveraging virtual machine technology, we propose a so...
متن کاملRootkits on Smart Phones: Attacks and Implications
Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. This paper examines the threat posed by rootkits to smart phones. Rootkits are malware that stealthily achieve their goals by modifying operating system ...
متن کاملAutomated Detection and Containment of Stealth Attacks on the Operating System Kernel By ARATI BALIGA
OF THE DISSERTATION Automated Detection and Containment of Stealth Attacks on the Operating System Kernel
متن کاملAutomated Discovery of Mimicry Attacks
Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manuallyconstructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2008
ISSN: 0167-4048
DOI: 10.1016/j.cose.2008.06.003