DocumentCode :
2846757
Title :
An Overview of Bootkit Attacking Approaches
Author :
Li, Xiang ; Wen, Yan ; Huang, Minhuan ; Liu, Qiang
Author_Institution :
Beijing Inst. of Syst. Eng., Beijing, China
fYear :
2011
fDate :
16-18 Dec. 2011
Firstpage :
428
Lastpage :
431
Abstract :
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boot kit can tamper the operating system and control the whole computer system. Compared to classic malware, it achieves a more powerful capability of hiding and controlling. This paper takes an overview of existing various boot kit technologies and summarizes their technical characteristics. This opens a door to the malware defenders for preventing the computer systems from boot kit.
Keywords :
invasive software; operating system kernels; bootkit attacking approach; computer system; file system; hardware store; innovative rootkit technology; malware defenders; operating system kernel; Booting; Computers; Hardware; Kernel; Loading; Malware; Malware; bootkit; operating system;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4577-2178-6
Type :
conf
DOI :
10.1109/MSN.2011.19
Filename :
6117459
Link To Document :
بازگشت