The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2007 vol.5)
pp: 65-68
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.
basic training, stealth software, passive, hooking
Richard Ford, William H. Allen, "How Not to Be Seen II: The Defenders Fight Back", IEEE Security & Privacy, vol.5, no. 6, pp. 65-68, November/December 2007, doi:10.1109/MSP.2007.166
1. Y.-M. Wang et al., "Detecting Stealth Software with Strider GhostBuster," Proc. IEEE Int'l Conf. Dependable Systems and Networks (DSN 05), IEEE CS Press, 2005, pp. 368–377.
2. T. Garfinkel et al., "Compatibility Is Not Transparency: VMM Detection Myths and Realities," Proc. 11th Workshop on Hot Topics in Operating Systems (HotOS XI), Usenix Assoc., 2007.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool