A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table

@article{Levine2004AMT,
  title={A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table},
  author={J. Levine and J. Grizzard and P. W. Hutto and H. Owen},
  journal={IEEE SoutheastCon, 2004. Proceedings.},
  year={2004},
  pages={25-31}
}
A cracker who gains access to a computer system will normally install some method, for use at a later time that allows the cracker to come back onto the system with root privilege. One method that a cracker may use is the installation of a rootkit on the compromised system. A kernel level rootkit will modify the underlying kernel of the installed operating system. The kernel controls everything that happens on a computer. We are developing a standardized methodology to characterize rootkits… CONTINUE READING
8 Citations
2 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Hackers Beware, Indianapolis

  • E. Cole
  • New Riders,
  • 2002
2 Excerpts

Similar Papers

Loading similar papers…