Difference between revisions of "Rootkits"

From CyberSecurity
Jump to: navigation, search
 
(12 intermediate revisions by the same user not shown)
Line 1: Line 1:
Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
+
*Updates
 +
** 11/26/05, Rares: Updated Main page with summary and latest draft
 +
 
 +
<br>Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
  
  
Line 5: Line 8:
 
Paper Sections/Works in Progress, etc
 
Paper Sections/Works in Progress, etc
  
 +
*[[Rootkits_Notes | Rootkit Notes ]]
 
* [[summary | Summary / Worklow]]
 
* [[summary | Summary / Worklow]]
* Section 1
+
** Section 1 - Grant
* Section 2
+
** Section 2 - Somnath Banerjee & Grant Musick
* Section 3
+
** Section 3 - Somnath Banerjee & Jameel Alsalam
* [[Rootkits_Sec4_Draft | Section 4 - Responses ]]
+
** [[Rootkits_Sec4_Draft | Section 4 - Responses - Rares & Jameel ]]
* Section 5
+
** Section 5 - Cost Evaluation - Jameel & Rares
 
+
* [[Research_Links | Research Links]]
See the discussion Tab where I accidentally posted most everything -Jameel
+
* Drafts
 +
** [[ Paper_Draft_Rev4 | Revision 4 (Sections 1-3)]]

Latest revision as of 05:26, 27 November 2005

  • Updates
    • 11/26/05, Rares: Updated Main page with summary and latest draft


Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc