This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Taking a Lesson from Stealthy Rootkits
July-August 2004 (vol. 2 no. 4)
pp. 38-45
Sandra Ring, The Sytex Group
Eric Cole, The Sytex Group
Attackers' obfuscation techniques make it difficult to detect kernel rootkits merely by looking at symbol-table information. The authors show how software developers can use obfuscation techniques to fight commercial-software reverse engineering and illegal distribution of their products by attackers.
Index Terms:
software obfuscation, reverse engineering, malicious code, rootkits
Citation:
Sandra Ring, Eric Cole, "Taking a Lesson from Stealthy Rootkits," IEEE Security & Privacy, vol. 2, no. 4, pp. 38-45, July-Aug. 2004, doi:10.1109/MSP.2004.57
Usage of this product signifies your acceptance of the Terms of Use.