Rootkit

Known as: Bootkit, Rootkit/archive, Anti-rootkit 
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Targeting the operating system (OS) kernel, kernel rootkits pose a formidable threat to computer systems and their users. Recent… (More)
  • figure 1
  • table 1
  • table 3
  • table 2
  • table 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Kernel rootkits, malicious software designed to compromise a running operating system kernel, are difficult to analyze and… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Kernel rootkits pose a significant threat to computer systems as they run at the highest privilege level and have unrestricted… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2008
2008
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often… (More)
  • figure 1
  • figure 2
  • table 1
  • table 3
  • figure 3
Is this relevant?
2008
2008
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper we present a case study of the steps leading up to the extraction of the spam bot payload found within a backdoor… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Kernel rootkits are considered one of the most dangerous forms of malware because they reside inside the kernel and can perform… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A rootkit is a collection of tools used by intruders to keep the legitimate users and administrators of a compromised machine… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?