The Community for Technology Leaders
Green Image
Issue No. 04 - July-August (2004 vol. 2)
ISSN: 1540-7993
pp: 38-45
Sandra Ring , The Sytex Group
Eric Cole , The Sytex Group
Attackers' obfuscation techniques make it difficult to detect kernel rootkits merely by looking at symbol-table information. The authors show how software developers can use obfuscation techniques to fight commercial-software reverse engineering and illegal distribution of their products by attackers.
software obfuscation, reverse engineering, malicious code, rootkits

E. Cole and S. Ring, "Taking a Lesson from Stealthy Rootkits," in IEEE Security & Privacy, vol. 2, no. , pp. 38-45, 2004.
83 ms
(Ver 3.3 (11022016))