DocumentCode
2846757
Title
An Overview of Bootkit Attacking Approaches
Author
Li, Xiang ; Wen, Yan ; Huang, Minhuan ; Liu, Qiang
Author_Institution
Beijing Inst. of Syst. Eng., Beijing, China
fYear
2011
fDate
16-18 Dec. 2011
Firstpage
428
Lastpage
431
Abstract
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boot kit can tamper the operating system and control the whole computer system. Compared to classic malware, it achieves a more powerful capability of hiding and controlling. This paper takes an overview of existing various boot kit technologies and summarizes their technical characteristics. This opens a door to the malware defenders for preventing the computer systems from boot kit.
Keywords
invasive software; operating system kernels; bootkit attacking approach; computer system; file system; hardware store; innovative rootkit technology; malware defenders; operating system kernel; Booting; Computers; Hardware; Kernel; Loading; Malware; Malware; bootkit; operating system;
fLanguage
English
Publisher
ieee
Conference_Titel
Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4577-2178-6
Type
conf
DOI
10.1109/MSN.2011.19
Filename
6117459
Link To Document