2004
DOI: 10.1109/msp.2004.57
|View full text |Cite
|
Sign up to set email alerts
|

Taking a lesson from stealthy rootkits

Abstract: A fter breaking into a system, attackers usually install rootkits to create secret backdoors and cover their tracks. Unlike the name implies, rootkits don't provide root access. Instead, they arm attackers with stealth on already compromised systems. Stealthy operations hide processes, files, and connections that let an attacker sustain long-term access without alerting system administrators. (See the "Rootkit 101" sidebar for more details on rootkits.) Fortunately, most rootkits suffer from a lack of covertne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…This means that DLL-or EXE-files, which hold the binaries of the Windows API such as ntdll.dll, ntoskrnl.exe, etc., are replaced with malicious code [47]. An advanced level on reverse engineering is required to alter official binaries correctly without destroying necessary routines and data structures, especially when it comes to kernel binaries.…”
Section: Static Patchingmentioning
confidence: 99%
“…This means that DLL-or EXE-files, which hold the binaries of the Windows API such as ntdll.dll, ntoskrnl.exe, etc., are replaced with malicious code [47]. An advanced level on reverse engineering is required to alter official binaries correctly without destroying necessary routines and data structures, especially when it comes to kernel binaries.…”
Section: Static Patchingmentioning
confidence: 99%
“…While our definition implies that having access to the network device will not reveal the presence of the service to unauthorized users, it does not prevent users from exploiting other operating system tools. We note, however, that this is an orthogonal issue and a variety of techniques are known for this purpose [24,25].…”
Section: Security Conditionmentioning
confidence: 99%
“…According to Ring and Cole (2004), there are two major categories of rootkits: user level and kernel level. User-level rootkits are often combined with Trojans into one category because they operate by placing a Trojan horse within applications.…”
Section: Historical Rootkit Categoriesmentioning
confidence: 99%
“…This lets administrators with access to the binary, or kernel, memory analyze it for suspicious string and symbol characteristics. They (administrators) can extract the strings and symbols and determine what attackers are doing to their systems" (Ring and Cole, 2004). Levine et al (2005) contends that identifying rootkits requires a more accurate system of classifying the different types.…”
Section: Prevention Detection and Removalmentioning
confidence: 99%