Volume 2 - Issue 3 – 4
A Brief Survey on Rootkit Techniques in Malicious Codes
- Sungkwan Kim
Soonchunhyang University, Shinchang-myun, Asan-si, Republic of Korea
carpedm@sch.ac.kr
- Junyoung Park
Soonchunhyang University, Shinchang-myun, Asan-si, Republic of Korea
wwkim3@sch.ac.kr
- Kyungroul Lee
Soonchunhyang University, Shinchang-myun, Asan-si, Republic of Korea
apple@sch.ac.kr
- Ilsun You
Korean Bible University, Seoul, Republic of Korea
isyou@bible.ac.kr
- Kangbin Yim
Soonchunhyang University, Shinchang-myun, Asan-si, Republic of Korea
yim@sch.ac.kr
Keywords: rootkit, malicious codes, keyboard security
Abstract
Nowadays, malicious codes are significantly increasing, leading to serious damages to information
systems. It is worth to note that these codes generally depend on the rootkit techniques to make it
more difficult for themselves to be analyzed and detected. Therefore, it is of paramount importance
to research the rootkits to effectively defend against malicious codes. In this paper, we explore and
survey the rootkit techniques both in user-level and kernel-level. Several rootkit samples are also
utilized for the test and verification purpose.