The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-August (2004 vol.2)
pp: 38-45
Sandra Ring , The Sytex Group
Eric Cole , The Sytex Group
ABSTRACT
Attackers' obfuscation techniques make it difficult to detect kernel rootkits merely by looking at symbol-table information. The authors show how software developers can use obfuscation techniques to fight commercial-software reverse engineering and illegal distribution of their products by attackers.
INDEX TERMS
software obfuscation, reverse engineering, malicious code, rootkits
CITATION
Sandra Ring, Eric Cole, "Taking a Lesson from Stealthy Rootkits", IEEE Security & Privacy, vol.2, no. 4, pp. 38-45, July-August 2004, doi:10.1109/MSP.2004.57
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool