Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering 2016
DOI: 10.1145/3015135.3015138
|View full text |Cite
|
Sign up to set email alerts
|

Detecting rootkits with the RAI runtime application inventory

Abstract: Remotely determining which precise code is running on which machines is hard. This is especially true if the monitored machines lack modern security features and may be under malware attack, since in such a scenario the malware may have already manipulated applications and operating systems. Existing approaches to this problem are heavyweight and have a large attack surface, which is frequently attacked by both applications and malware. To address this problem, this paper introduces RAI, a lightweight code mon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 36 publications
0
0
0
Order By: Relevance