The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2007 vol. 5)
ISSN: 1540-7993
pp: 65-68
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
ABSTRACT
In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.
INDEX TERMS
basic training, stealth software, passive, hooking
CITATION
Richard Ford, William H. Allen, "How Not to Be Seen II: The Defenders Fight Back", IEEE Security & Privacy, vol. 5, no. , pp. 65-68, November/December 2007, doi:10.1109/MSP.2007.166
88 ms
(Ver )