Rootkits
From CyberSecurity
- Updates
- 11/26/05, Rares: Updated Main page with summary and latest draft
Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
Paper Sections/Works in Progress, etc
- Rootkit Notes
- Summary / Worklow
- Section 1 - Grant
- Section 2 - Somnath Banerjee & Grant Musick
- Section 3 - Somnath Banerjee & Jameel Alsalam
- Section 4 - Responses - Rares & Jameel
- Section 5 - Cost Evaluation - Jameel & Rares
- Research Links
- Drafts