Analysis of Security of Rootkit Detection Methods

Ievgeniia Kuzminykh, Maryna Yevdokymenko

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Recent years have witnessed an increasing number of attacks using more sophisticated, advanced rootkits, met by substantial efforts in the security community to improve current detection methods. This paper contributes to these efforts through a state-of-the-art overview of rootkit technologies and the associated modern detection methods. Furthermore, it describes the weaknesses associated with the Secure Boot technologies which made it possible for rootkits such as LoJax to infect the boot process.
Original languageEnglish
Title of host publicationProceedings of 2019 Ieee International Conference on Advanced Trends in Information Theory
PublisherIEEE
Publication date2019
Pages196-199
ISBN (Print)9781728161440
DOIs
Publication statusPublished - 2019
Event2019 IEEE International Conference on Advanced Trends in Information Theory - Taras Shevchenko National University of Kyiv, Kyiv , Ukraine
Duration: 18 Dec 201920 Dec 2019
http://atit.ieee.org.ua/

Conference

Conference2019 IEEE International Conference on Advanced Trends in Information Theory
LocationTaras Shevchenko National University of Kyiv
CountryUkraine
CityKyiv
Period18/12/201920/12/2019
Internet address

Keywords

  • Rootkit
  • UEFI
  • LoJax
  • Detection methods
  • Secure Boot

Fingerprint Dive into the research topics of 'Analysis of Security of Rootkit Detection Methods'. Together they form a unique fingerprint.

Cite this