Computer Science ›› 2008, Vol. 35 ›› Issue (6): 103-106.
Previous Articles Next Articles
Online:
Published:
Abstract: Hooking the system services to hide the presence of objects such as processes, files, registry keys, and open ports is the most popular method of rootkits. But a great deal of rootkits detection methods can't tell the relationship between the rootkits and
Key words: Rootkits,System service,Behavior,Control-flow graph,Data-flow graph,Call graph
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I6/103
Cited