Title :
How Not to Be Seen II: The Defenders Fight Back
Author :
Ford, Richard ; Allen, William H.
Author_Institution :
Florida Inst. of Technol., Melbourne
Abstract :
For pt.I see ibid., vol. 5, no.1, p.67-69 (2007). This article discusses about stealthy software-that is, software that manipulates a computer in some way to avoid some aspect of its operation. The stealth is divided up into roughly three categories: passive, hooking, and hypervisor-based stealth detection. Most stealth malware hides by hooking and redirecting system calls, either at the kernel or the operating system (OS) level.
Keywords :
computer viruses; hooking stealth; hypervisor-based stealth; operating system kernel; passive stealth; stealth malware detection; stealthy software; system calls redirection; well-defmed; Costs; Counting circuits; Kernel; Operating systems; Protection; Radio access networks; Security; Viruses (medical); Writing; basic training; hooking; passive; stealth software;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2007.166