Show simple item record

dc.contributor.authorLobo, Desmonden_US
dc.contributor.authorSun, Lien_US
dc.contributor.authorWatters, Paulen_US
dc.contributor.authorWu, Xin-Wenen_US
dc.contributor.editorLisa O'Connoren_US
dc.date.accessioned2017-04-04T15:17:39Z
dc.date.available2017-04-04T15:17:39Z
dc.date.issued2010en_US
dc.date.modified2011-06-20T06:48:48Z
dc.identifier.doi10.1109/CTC.2010.9en_AU
dc.identifier.urihttp://hdl.handle.net/10072/37830
dc.description.abstractWindows XP is the dominant operating system in the world today and root kits have been a major concern for XP users. This paper provides an in-depth analysis of the root kits that target that operating system, while focusing on those that use various hooking techniques to hide malware on a machine. We identify some of the weaknesses in the Windows XP architecture that root kits exploit and then evaluate some of the anti-root kit security features that Microsoft has unveiled in Vista and 7. To reduce the number of root kit infections in the future, we suggest that Microsoft should take full advantage of Intel's four distinct privilege levels.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent344167 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEEen_US
dc.publisher.placeUnited Statesen_US
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencenameSecond Cybercrime and Trustworthy Computing Workshop (CTC 2010)en_US
dc.relation.ispartofconferencetitleProceedings. Second Cybercrime and Trustworthy Computing Workshop (CTC 2010)en_US
dc.relation.ispartofdatefrom2010-07-19en_US
dc.relation.ispartofdateto2010-07-20en_US
dc.relation.ispartoflocationBallaraten_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchComputer System Securityen_US
dc.subject.fieldofresearchcode080303en_US
dc.titleWindows Rootkits: Attacks and Countermeasuresen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.rights.copyrightCopyright 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_AU
gro.date.issued2010
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record