Difference between revisions of "Rootkits"
From CyberSecurity
Line 1: | Line 1: | ||
*Updates | *Updates | ||
− | ** 11/26/05, Rares: Updated Main page with summary | + | ** 11/26/05, Rares: Updated Main page with summary |
<br>Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps. | <br>Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps. | ||
Line 12: | Line 12: | ||
** Section 1 - Grant | ** Section 1 - Grant | ||
** Section 2 - Somnath Banerjee & Grant Musick | ** Section 2 - Somnath Banerjee & Grant Musick | ||
− | ** Section 3 - Somnath Banerjee | + | ** Section 3 - Somnath Banerjee & Jameel Alsalam |
** [[Rootkits_Sec4_Draft | Section 4 - Responses - Rares & Jameel ]] | ** [[Rootkits_Sec4_Draft | Section 4 - Responses - Rares & Jameel ]] | ||
** Section 5 - Cost Evaluation - Jameel & Rares | ** Section 5 - Cost Evaluation - Jameel & Rares | ||
* [[Research_Links | Research Links]] | * [[Research_Links | Research Links]] |
Revision as of 04:42, 27 November 2005
- Updates
- 11/26/05, Rares: Updated Main page with summary
Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
Paper Sections/Works in Progress, etc
- Rootkit Notes
- Summary / Worklow
- Section 1 - Grant
- Section 2 - Somnath Banerjee & Grant Musick
- Section 3 - Somnath Banerjee & Jameel Alsalam
- Section 4 - Responses - Rares & Jameel
- Section 5 - Cost Evaluation - Jameel & Rares
- Research Links