Implementing rootkits to address operating system vulnerabilities

Manuel Corregedor, Sebastiaan Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques.

Original languageEnglish
Title of host publication2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference
DOIs
Publication statusPublished - 2011
Event2011 Conference on Information Security for South Africa, ISSA 2011 - Rosebank, Johannesburg, South Africa
Duration: 15 Aug 201117 Aug 2011

Publication series

Name2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference

Conference

Conference2011 Conference on Information Security for South Africa, ISSA 2011
Country/TerritorySouth Africa
CityRosebank, Johannesburg
Period15/08/1117/08/11

Keywords

  • Rootkits
  • malware
  • security
  • vulnerabilities

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Implementing rootkits to address operating system vulnerabilities'. Together they form a unique fingerprint.

Cite this