Rootkits pose a dilemma in forensic investigations because hackers use them surreptitiously to mislead investigators. This paper analyzes the effectiveness of online and offline information analysis techniques in detecting rootkits and determining the processes and/or files hidden by rootkits. Five common rootkits were investigated using a live analysis tool, five rootkit detection tools (RDTs) and four offline analysis tools. The experimental results indicate that, while live analysis techniques provide a surprising amount of information and offline analysis provides accurate information, RDTs are the best approach for detecting rootkits and hidden processes. © 2007 International Federation for Information Processing.
CITATION STYLE
Todd, A., Benson, J., Peterson, G., Franz, T., Stevens, M., & Raines, R. (2007). Analysis of tools for detecting rootkits and hidden processes. In IFIP International Federation for Information Processing (Vol. 242, pp. 89–105). https://doi.org/10.1007/978-0-387-73742-3_6
Mendeley helps you to discover research relevant for your work.