Difference between revisions of "Rootkits"

From CyberSecurity
Jump to: navigation, search
Line 10: Line 10:
 
*[[Rootkits_Notes | Rootkit Notes ]]
 
*[[Rootkits_Notes | Rootkit Notes ]]
 
* [[summary | Summary / Worklow]]
 
* [[summary | Summary / Worklow]]
** Section 1
+
** Section 1 - Grant
** Section 2
+
** Section 2 - Somnath Banerjee & Grant Musick
** Section 3
+
** Section 3 - Somnath Banerjee and Jameel Alsalam
** [[Rootkits_Sec4_Draft | Section 4 - Responses ]]
+
** [[Rootkits_Sec4_Draft | Section 4 - Responses - Rares & Jameel ]]
** Section 5
+
** Section 5 - Cost Evaluation - Jameel & Rares
 
* [[Research_Links | Research Links]]
 
* [[Research_Links | Research Links]]

Revision as of 04:41, 27 November 2005

  • Updates
    • 11/26/05, Rares: Updated Main page with summary, removed summary from discussion section


Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc