-
2
-
-
60649121295
-
Invisible intruders: Rootkits in practice
-
[B99]
-
[B99] D. Brumley, "Invisible Intruders: Rootkits In Practice," ;login: The Magazine of USENIX and SAGE, http://www.usenix.org/publications/ login/1999-9/features/rootkits.html, 1999.
-
(1999)
Login: The Magazine of USENIX and SAGE
-
-
Brumley, D.1
-
3
-
-
4544366279
-
Remote repair of operating system state using backdoors
-
[BNG+04], May
-
[BNG+04] A. Bohra, I. Neamtiu, P. Gallard, F. Sultan, and L. Iftode, "Remote Repair of Operating System State Using Backdoors," in Proc. Int. Conf. on Autonomic Computing (ICAC), pp. 256-263, May 2004.
-
(2004)
Proc. Int. Conf. on Autonomic Computing (ICAC)
, pp. 256-263
-
-
Bohra, A.1
Neamtiu, I.2
Gallard, P.3
Sultan, F.4
Iftode, L.5
-
5
-
-
84875947153
-
Detours: Binary interception of win32 functions
-
[HB99], July
-
[HB99] Galen Hunt and Doug Brubacher. "Detours: Binary Interception of Win32 Functions," in Proc. the 3rd Usenix Windows NT Symposium, pp. 135-143, July 1999 (http://research.microsoft.com/sn/detours/).
-
(1999)
Proc. the 3rd Usenix Windows NT Symposium
, pp. 135-143
-
-
Hunt, G.1
Brubacher, D.2
-
7
-
-
27544441745
-
Loadable kernel modules
-
[J01], Nov.
-
[J01] K. Jones, "Loadable kernel modules," ;login: The Magazine of USENIX and SAGE, http://www.usenix.org/Publications/login/2001-11/pdfs/ jones2.pdf, Nov. 2001.
-
(2001)
Login: The Magazine of USENIX and SAGE
-
-
Jones, K.1
-
8
-
-
85028170979
-
Establishing the genuinity of remote computer systems
-
[KJ03], August
-
[KJ03] Rick Kennell and Leah H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," In Proc. USENIX Security Symposium, August 2003
-
(2003)
Proc. USENIX Security Symposium
-
-
Kennell, R.1
Jamieson, L.H.2
-
10
-
-
84861263018
-
-
[MSDN]
-
[MSDN] Naming a File, http://msdn.microsoft.com/library/default.asp?url=/ library/enus/fileio/base/naming_ a_file.asp.
-
Naming a File
-
-
-
11
-
-
84897418201
-
-
[PE]
-
[PE] Process Explorer, http:/www.sysinternals.com/ntw2k/freeware/procexp. shtml.
-
Process Explorer
-
-
-
13
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
[PFM+04], Aug.
-
[PFM+04] Nick L. Petroni, Jr., Timothy Fraser, Jesus Molina, and William A. Arbaugh, "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor," in Proc. Usenix Security Symposium, Aug. 2004
-
(2004)
Proc. Usenix Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
15
-
-
84861263879
-
-
[RIS] Remote Installation Services
-
[RIS] Remote Installation Services, http://www.microsoft.com/windows2000/ en/datacenter/help/default.asp?url=/windows2000/en/datacenter/help/ sag_RIS_Default_topnode.htm.
-
-
-
-
16
-
-
3042738543
-
SWATT: SoftWare-based ATTestation for embedded devices
-
[SPDK04], May
-
[SPDK04] A. Seshadri, A. Perrig, L. van Doom, and P. Khosla, "SWATT: SoftWare-based ATTestation for Embedded Devices," in Proc. IEEE Symp. on Security and Privacy, May 2004
-
(2004)
Proc. IEEE Symp. on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Van Doom, L.3
Khosla, P.4
-
17
-
-
84862046998
-
-
[SR]
-
[SR] Windows XP System Restore, http://msdn.microsoft.com/library/ default.asp?url=/library/enus/dnwxp/html/windowsxpsystemrestore.asp.
-
Windows XP System Restore
-
-
-
18
-
-
84861261649
-
-
[SRM]
-
[SRM] System Restore Monitored File Extensions, http.//msdn.microsoft. com/library/default.asp?url=/library/enus/sr/sr/monitored_file_extensions.asp.
-
System Restore Monitored File Extensions
-
-
-
20
-
-
84861266558
-
Strider GhostBuster: Why it's a bad idea for stealth software to hide files
-
[W04], Work-in-Progress Report presentation, Aug.
-
[W04] "Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files," Yi-Min Wang, Usenix Security Symposium, Work-in-Progress Report presentation, http://www.usenix.org/events/sec04/tech/wips/, Aug. 2004.
-
(2004)
Usenix Security Symposium
-
-
Wang, Y.-M.1
-
22
-
-
4544239810
-
AskStrider: What has changed on my machine lately?
-
[WR+04], Jan.
-
[WR+04] Yi-Min Wang, et al., "AskStrider: What Has Changed on My Machine Lately?", Microsoft Research Technical Report MSR-TR-2004-03, Jan. 2004.
-
(2004)
Microsoft Research Technical Report
, vol.MSR-TR-2004-03
-
-
Wang, Y.-M.1
-
23
-
-
33750584355
-
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for spyware management
-
[WRV+04], Nov.
-
[WRV+04] Yi-Min Wang, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management," in Proc. Usenix LISA, Nov. 2004.
-
(2004)
Proc. Usenix LISA
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
-
24
-
-
77952114571
-
STRIDER: A black-box, state-based approach to change and configuration management and support
-
[WVD+03], October
-
[WVD+03] Yi-Min Wang, et al., "STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support," Proc. Usenix Large Installation Systems Administration (LISA) Conference, pp. 159-171, October 2003.
-
(2003)
Proc. Usenix Large Installation Systems Administration (LISA) Conference
, pp. 159-171
-
-
Wang, Y.-M.1
-
25
-
-
27544452676
-
Persistent-state checkpoint comparison for troubleshooting configuration failures
-
[WVS03], June
-
[WVS03] Yi-Min Wang, Chad Verbowski, and Daniel R. Simon, "Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures", in Proc. IEEE DSN, June 2003.
-
(2003)
Proc. IEEE DSN
-
-
Wang, Y.-M.1
Verbowski, C.2
Simon, D.R.3
-
26
-
-
33845390072
-
Strider GhostBuster: Why it's a bad idea for stealth software to hide files
-
[WVR+04], July
-
[WVR+04] Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files," Microsoft Research Technical Report MSR-TR-2004-71, July 2004.
-
(2004)
Microsoft Research Technical Report
, vol.MSR-TR-2004-71
-
-
Wang, Y.-M.1
Vo, B.2
Roussev, R.3
Verbowski, C.4
Johnson, A.5
-
27
-
-
84861259069
-
-
[XA04], (DOS attacks), April
-
[XA04] "Alarm growing over bot software," (DOS attacks), CNET News.com, http://news.zdnet.com/2100-1009_22-5202236.html, April 2004.
-
(2004)
Alarm Growing over Bot Software
-
-
-
28
-
-
33244482268
-
Guilty plea in Kinko's keystroke caper
-
[XG03], (stealing online banking passwords), July 18
-
[XG03] "Guilty Plea in Kinko's Keystroke Caper," (stealing online banking passwords), Security Focus, July 18, 2003.
-
(2003)
Security Focus
-
-
-
29
-
-
27544500259
-
Gone flushing: Web scam takes dangerous turn
-
[XG04], (stealing online banking passwords), May 27
-
[XG04] "Gone Flushing: Web Scam Takes Dangerous Turn," (stealing online banking passwords), Wall Street Journal, May 27, 2004.
-
(2004)
Wall Street Journal
-
-
-
31
-
-
84861268772
-
-
[XP04], (phishing), The Register, Nov. 26
-
[XP04] "Phishers tapping botnets to automate attacks", (phishing), The Register, http://www.theregister.co.uk/2004/11/26/anti- phishing_report/, Nov. 26, 2004.
-
(2004)
Phishers Tapping Botnets to Automate Attacks
-
-
-
32
-
-
27544491863
-
Spreading web virus aims to steal financial data
-
[XS04], June 25
-
[XS04] "Spreading Web Virus Aims to Steal Financial Data," Reuters, June 25, 2004.
-
(2004)
Reuters
-
-
-
33
-
-
84861264553
-
-
[XW04], (dialers, spamming), The Register, Dec.
-
[XW04] "White collar virus writers make cash from chaos," (dialers, spamming), The Register, http://www.theregister.co.uk/2004/12/07/ sophos_av_review_2004/, Dec. 2004.
-
(2004)
White Collar Virus Writers Make Cash from Chaos
-
-
-
34
-
-
27544469994
-
-
[XZ04], PC World, July
-
[XZ04] "Zombie PCs: Silent, Growing Threat," PC World, http://www.pcworld.com/news/article/0,aid,116841,00.asp, July 2004.
-
(2004)
Zombie PCs: Silent, Growing Threat
-
-
-
35
-
-
84861264742
-
An overview of unix rootkits
-
[YA03], iDefense Labs, February
-
[YA03] A. Chuvakin, "An Overview of Unix Rootkits," iALERT White Paper, iDefense Labs, http://www.megasecurity.org/papers/Rootkits.pdf, February 2003.
-
(2003)
iALERT White Paper
-
-
Chuvakin, A.1
-
36
-
-
84861264922
-
-
[YB]
-
[YB] BIOS and Flash Utilities, http://h20000.www2.hp.com/bizsupport/ TechSupport/DriverDownload.jsp?pnameOID=100870&locale=en_US&taskId=135 &refresh=true&prodTypeld= 12454&prodSeriesId=96495&sw-EnvOID= 1093#2663.
-
BIOS and Flash Utilities
-
-
-
39
-
-
84861258764
-
Nasty new parasite
-
[YC04], (stealth spyware), June 8
-
[YC04] "Nasty New Parasite," (stealth spyware), Spyware Weekly Newsletter, http://www.spywareinfo.com/newsletter/archives/0604/8.php, June 8, 2004.
-
(2004)
Spyware Weekly Newsletter
-
-
-
41
-
-
84861263050
-
-
[YH]
-
[YH] Hidden Registry Keys, http//www.sysinternals.com/ntw2k/info/tips. shtml#registryhidden.
-
Hidden Registry Keys
-
-
-
42
-
-
84861268204
-
-
[YH03], May 8
-
[YH03] "How to become unseen on Windows NT," http://rootkit.host.sk/knowhow/hidingen.txt, May 8, 2003.
-
(2003)
How to Become Unseen on Windows NT
-
-
-
48
-
-
84872311782
-
Linux on-the-fly kernel patching without LKM
-
[YL01], Dec.
-
[YL01] "Linux on-the-fly kernel patching without LKM", http://www.phrack.org/phrack/58/p58-0x07, Phrack Magazine, Dec. 2001.
-
(2001)
Phrack Magazine
-
-
-
49
-
-
27544461585
-
NTIllusion - A portable Win32 userland rootkit.txt
-
[YN04], July 13
-
[YN04] "NTIllusion - A portable Win32 userland rootkit.txt," Phrack Magazine, July 13, 2004.
-
(2004)
Phrack Magazine
-
-
-
50
-
-
84861257279
-
-
[YO03] OpioN, March
-
[YO03] OpioN, "Kernel Rootkits Explained", http://www.ebcvg. com/articles.php?id=124, March 2003.
-
(2003)
Kernel Rootkits Explained
-
-
-
52
-
-
84861259145
-
-
[YV04]
-
[YV04] VICE - Catch the hookers! http://www.blackhat.com/presentations/ bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf.
-
VICE - Catch the Hookers!
-
-
-
53
-
-
84855862111
-
Weakening the linux kernel
-
[YW98], Jan.
-
[YW98] "Weakening the Linux Kernel," Phrack Magazine, http://www.phrack.org/phrack/52/P52-18, Jan. 1998.
-
(1998)
Phrack Magazine
-
-
-
54
-
-
84861258948
-
-
[ZA]
-
[ZA] API Hook SDK 2.12, http://www.devarchive.com/fl709.html.
-
API Hook SDK 2.12
-
-
-
57
-
-
84861264926
-
-
[ZB] Berbew
-
[ZB] Berbew, http://securityresponse.symantec.com/avcenter/venc/data/ backdoor.berbew.j.html.
-
-
-
-
58
-
-
84861270917
-
-
[ZD]
-
[ZD] Darkside rootkit, http://www.antiserver.it/backdoor-rootkit/.
-
Darkside Rootkit
-
-
-
60
-
-
84880390547
-
-
[ZFU]
-
[ZFU] The FU Rootkit, http://www.rootkit.com/vault/fuzen_op/FU_Rootkit. zip.
-
The FU Rootkit
-
-
-
61
-
-
84861264925
-
-
[ZH]
-
[ZH] Hacker Defender, http://rootkit.host.sk/.
-
-
-
Defender, H.1
-
62
-
-
84861265047
-
-
[ZHF]
-
[ZHF] Hide Files 3.3, http://www.tomdownload.com/new_add/new20031128/ hide_files_folders.htm.
-
Hide Files 3.3
-
-
-
63
-
-
84861260311
-
-
[ZHO]
-
[ZHO] Hide Folders XP, http://www.fspro.net/downloads.html.
-
Hide Folders XP
-
-
-
64
-
-
84861255609
-
-
[ZK]
-
[ZK] Knark LKM-rootkit, http://www.sans.org/resources/idfaq/knark.php.
-
Knark LKM-rootkit
-
-
-
66
-
-
84861264289
-
-
[ZR] RootKits
-
[ZR] RootKits, http://www.rootkit.com/.
-
-
-
-
67
-
-
84861256750
-
-
[ZS]
-
[ZS] Superkit rootkit, http://www.remoteassessment.com/darchive/ 191006794.html.
-
Superkit Rootkit
-
-
-
68
-
-
84861258650
-
-
[ZT]
-
[ZT] The T0rnkit rootkit, http://www.europe.f-secure.com/vdescs/tom. shtml.
-
The T0rnkit Rootkit
-
-
-
69
-
-
84861265151
-
-
[ZU]
-
[ZU] The Urbin Trojan, http://vil.nai.com/vil/content/v_125663.htm.
-
The Urbin Trojan
-
-
-
70
-
-
84861267420
-
-
[ZV]
-
[ZV] Vanquish, https://www.rootkit.com/project.phD?id=9.
-
Vanquish
-
-
-
71
-
-
84861261086
-
-
[ZVI]
-
[ZVI] Vice, http://www.rootkjt.com/project.php?id=20.
-
Vice
-
-
|