메뉴 건너뛰기




Volumn , Issue , 2008, Pages

SMM rootkits: A new breed of os independent malware

Author keywords

Malware; Operating system security; Rootkit; System Management Mode; Virtualization

Indexed keywords

MALWARE; OPERATING SYSTEM SECURITY; ROOTKIT; SYSTEM MANAGEMENT MODE; VIRTUALIZATION;

EID: 70249116478     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1460877.1460892     Document Type: Conference Paper
Times cited : (57)

References (30)
  • 1
    • 33751032041 scopus 로고    scopus 로고
    • S.T. King, P.M. Chen, Y-M Wang, C. Verbowski, H.J. Wang, and J.R. Lorch. Subvirt: Implementing malware with virtual machines. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S & P'06), pages 314{327, Washington, DC, USA, 2006. IEEE Computer Society.
    • S.T. King, P.M. Chen, Y-M Wang, C. Verbowski, H.J. Wang, and J.R. Lorch. Subvirt: Implementing malware with virtual machines. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S & P'06), pages 314{327, Washington, DC, USA, 2006. IEEE Computer Society.
  • 2
    • 53349091372 scopus 로고    scopus 로고
    • th Workshop on Hot Topics in Operating Systems, 2007. USENIX.
    • th Workshop on Hot Topics in Operating Systems, 2007. USENIX.
  • 3
    • 55549097262 scopus 로고    scopus 로고
    • Subverting Vista Kernel for Fun and Profit
    • Presented at, Aug
    • J. Rutkowska. Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, Aug. 2006.
    • (2006) Black Hat USA
    • Rutkowska, J.1
  • 8
    • 35949000051 scopus 로고    scopus 로고
    • Implementing and Detecting an ACPI BIOS Rootkit
    • Presented at
    • J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal, 2006.
    • (2006) Black Hat Federal
    • Heasman, J.1
  • 10
    • 70249094561 scopus 로고    scopus 로고
    • S. Sparks and J. Butler. Shadow Walker: Raising the Bar for Windows Rootkit Detection. In Phrack 0x0B, Issue 0x3D, Phile #0x08 of 0x14. 2005.
    • S. Sparks and J. Butler. Shadow Walker: Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x14. 2005.
  • 11
    • 33751059942 scopus 로고    scopus 로고
    • VICE - Catch the Hookers
    • Presented at, Aug
    • J. Butler. VICE - Catch the Hookers. Presented at Black Hat USA. Aug 2004.
    • (2004) Black Hat USA
    • Butler, J.1
  • 12
    • 84988573115 scopus 로고    scopus 로고
    • G. Kim and E. Spafford. The design and implementation of tripwire: a file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and communications security, 1994. ACM Press.
    • G. Kim and E. Spafford. The design and implementation of tripwire: a file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and communications security, 1994. ACM Press.
  • 14
    • 85084162914 scopus 로고    scopus 로고
    • N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor. In Proc. Usenix Security Symposium, Aug. 2004.
    • N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor. In Proc. Usenix Security Symposium, Aug. 2004.
  • 15
    • 84869624239 scopus 로고    scopus 로고
    • 8042 Keyboard Controller
    • 8042 Keyboard Controller. http://heim.ifi.uio.no/~stanisls/helppc/8042. html
  • 16
    • 84869608987 scopus 로고    scopus 로고
    • Rootkit. http://en.wikipedia.org/wiki/Rootkit. 2007.
    • (2007) Rootkit
  • 17
    • 70249103744 scopus 로고    scopus 로고
    • B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1, 2006. http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
    • B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1, 2006. http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
  • 19
    • 0542372739 scopus 로고    scopus 로고
    • Framework for Modeling Trojans and Computer Virus Infections
    • Thimbleby, S. Anderson, P. Cairns. A Framework for Modeling Trojans and Computer Virus Infections. The Computer Journal, Vol. 41, No. 7, pp. 444-458. 1998.
    • (1998) The Computer Journal , vol.41 , Issue.7 , pp. 444-458
    • Thimbleby, S.1    Anderson, P.2    Cairns, A.3
  • 20
    • 67651038840 scopus 로고    scopus 로고
    • * NT Rootkit, patching the NT Kernel
    • * NT Rootkit, patching the NT Kernel. In Phrack Magazine, Vol. 9, No 55, 1999.
    • (1999) In Phrack Magazine , vol.9 , Issue.55
    • Hoglund, G.1
  • 22
    • 38149023819 scopus 로고    scopus 로고
    • System Virginity Verifier - Defining the Roadmap for Malware Detection on Windows System
    • Presented at, Sept
    • J. Rutkowska. System Virginity Verifier - Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. Sept 2005.
    • (2005) Hack In The Box
    • Rutkowska, J.1
  • 23
    • 77949482440 scopus 로고    scopus 로고
    • Hardware Virtualization Rootkits. Presented at Black Hat USA
    • Aug
    • D. A. Zovi. Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug 2006. http://www.theta44.org/software/HVM-Rootkits-ddz-bh-usa-06. pdf
    • (2006)
    • Zovi, D.A.1
  • 25
    • 35949000051 scopus 로고    scopus 로고
    • Implementing and Detecting an ACPI BIOS Rootkit
    • Presented at
    • J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal. 2006.
    • (2006) Black Hat, Federal
    • Heasman, J.1
  • 26
    • 84869630206 scopus 로고    scopus 로고
    • http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf
  • 28
    • 70149125332 scopus 로고    scopus 로고
    • IsGameOver() Anyone? Presented at Black Hat
    • Aug
    • J. Rutkowska. IsGameOver() Anyone? Presented at Black Hat, USA. Aug 2007.
    • (2007) USA
    • Rutkowska, J.1
  • 29
    • 84869603073 scopus 로고    scopus 로고
    • Windbg. http://en.wikipedia.org/wiki/WinDbg. 2007.
    • (2007) Windbg


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.