Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

Air Force Institute of Technology

Theses/Dissertations

Computers--Access control--Evaluation

Articles 1 - 1 of 1

Full-Text Articles in Engineering

A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg Mar 2007

A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg

Theses and Dissertations

In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we cannot trust the information within our computer systems then we cannot properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent …