Windows rootkits: Attacks and countermeasures

Lobo, D, Watters, P, Wu, X and Sun, L 2010, 'Windows rootkits: Attacks and countermeasures', in Prof Josef Pieprzyk, A/Prof Paul Watters (ed.) Second Cybercrime and Trustworthy Computing Workshop, CTC 2010, Ballarat, Australia, 19-20 July 2010, pp. 69-78.


Document type: Conference Paper
Collection: Conference Papers

Title Windows rootkits: Attacks and countermeasures
Author(s) Lobo, D
Watters, P
Wu, X
Sun, L
Year 2010
Conference name 2010 Second Cybercrime and Trustworthy Computing Workshop
Conference location Ballarat, Australia
Conference dates 19-20 July 2010
Proceedings title Second Cybercrime and Trustworthy Computing Workshop, CTC 2010
Editor(s) Prof Josef Pieprzyk, A/Prof Paul Watters
Publisher IEEE
Place of publication Washington DC, USA
Start page 69
End page 78
Total pages 10
Abstract Windows XP is the dominant operating system in the world today and rootkits have been a major concern for XP users. This paper provides an in-depth analysis of the rootkits that target that operating system, while focusing on those that use various hooking techniques to hide malware on a machine. We identify some of the weaknesses in the Windows XP architecture that rootkits exploit and then evaluate some of the anti-rootkit security features that Microsoft has unveiled in Vista and 7. To reduce the number of rootkit infections in the future, we suggest that Microsoft should take full advantage of Intel's four distinct privilege levels.
Subjects Computer System Security
Operating Systems
Keyword(s) computer security
malicious software (malware)
rootkits
Microsoft Windows
Intel's ring architecture
Copyright notice © 2010 IEEE
ISBN 9780769541860
Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 4 times in Scopus Article | Citations
Access Statistics: 321 Abstract Views  -  Detailed Statistics
Created: Mon, 07 Jan 2013, 10:07:00 EST by Catalyst Administrator
© 2014 RMIT Research Repository • Powered by Fez SoftwareContact us