p.2653
p.2657
p.2665
p.2669
p.2674
p.2678
p.2684
p.2688
p.2693
Study on Information Security Monitoring Framework
Abstract:
As malware has become increasingly sophisticated over the past several years, it is no longer unusual to see it disable critical security services on a victims machine. In our threat model, we assume the attacker can compromise the users OS and any application running inside it. The results show that our threat model makes an introspection assumption stating that the OS and application level data structures in the User VM memory have not been altered, it is still instructive to consider what it would take to perform this type of attack, and the most security critical data is located in the User OS kernel.
Info:
Periodical:
Pages:
2674-2677
Citation:
Online since:
June 2013
Authors:
Price:
Сopyright:
© 2013 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: