An overview of bootkit attacking approaches
X Li, Y Wen, MH Huang, Q Liu - … on Mobile Ad-hoc and Sensor …, 2011 - ieeexplore.ieee.org
X Li, Y Wen, MH Huang, Q Liu
2011 Seventh International Conference on Mobile Ad-hoc and Sensor …, 2011•ieeexplore.ieee.orgBoot kit, as an innovative root kit technology, transfer its storage location from the file system
to the hardware store, and activates itself while or even before the operating system kernel is
loaded. Therefore, boot kit can tamper the operating system and control the whole computer
system. Compared to classic malware, it achieves a more powerful capability of hiding and
controlling. This paper takes an overview of existing various boot kit technologies and
summarizes their technical characteristics. This opens a door to the malware defenders for …
to the hardware store, and activates itself while or even before the operating system kernel is
loaded. Therefore, boot kit can tamper the operating system and control the whole computer
system. Compared to classic malware, it achieves a more powerful capability of hiding and
controlling. This paper takes an overview of existing various boot kit technologies and
summarizes their technical characteristics. This opens a door to the malware defenders for …
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boot kit can tamper the operating system and control the whole computer system. Compared to classic malware, it achieves a more powerful capability of hiding and controlling. This paper takes an overview of existing various boot kit technologies and summarizes their technical characteristics. This opens a door to the malware defenders for preventing the computer systems from boot kit.
ieeexplore.ieee.org