• DocumentCode
    2846757
  • Title

    An Overview of Bootkit Attacking Approaches

  • Author

    Li, Xiang ; Wen, Yan ; Huang, Minhuan ; Liu, Qiang

  • Author_Institution
    Beijing Inst. of Syst. Eng., Beijing, China
  • fYear
    2011
  • fDate
    16-18 Dec. 2011
  • Firstpage
    428
  • Lastpage
    431
  • Abstract
    Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boot kit can tamper the operating system and control the whole computer system. Compared to classic malware, it achieves a more powerful capability of hiding and controlling. This paper takes an overview of existing various boot kit technologies and summarizes their technical characteristics. This opens a door to the malware defenders for preventing the computer systems from boot kit.
  • Keywords
    invasive software; operating system kernels; bootkit attacking approach; computer system; file system; hardware store; innovative rootkit technology; malware defenders; operating system kernel; Booting; Computers; Hardware; Kernel; Loading; Malware; Malware; bootkit; operating system;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4577-2178-6
  • Type

    conf

  • DOI
    10.1109/MSN.2011.19
  • Filename
    6117459