Abstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. Since theinvolved core techniques are beginning to catch on nowadays, we should analyzesome new key techniques employed for application of Rootkits, discuss the specificmethods and propose a set of defense strategy for computer security.
Identifer | oai:union.ndltd.org:UPSALLA1/oai:DiVA.org:lnu-8378 |
Date | January 2010 |
Creators | Li, Jie, Lu, Yuting |
Publisher | Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM |
Source Sets | DiVA Archive at Upsalla University |
Language | English |
Detected Language | English |
Type | Student thesis, info:eu-repo/semantics/bachelorThesis, text |
Format | application/pdf |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0018 seconds