Back to Results
First PageMeta Content
Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software


“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p
Add to Reading List

Document Date: 2014-12-16 19:06:36


Open Document

File Size: 415,72 KB

Share Result on Facebook

Company

IDT / HBGary Inc. / Enterasys Networks Inc. / Offensive Rootkit Technologies / /

Facility

University of Central Florida / /

IndustryTerm

subversive technologies / digital forensic applications / defensive malicious code technologies / parental control software / /

OperatingSystem

UNIX / Integrity / Microsoft Windows / /

Organization

University of Central Florida / /

Person

Jamie Butler / Greg Hoglund / Joanna Rutkowska Detecting Hooks / Sherri Sparks / Sherri Sparks Jamie Butler / Jamie Butler Detecting / /

Position

senior developer / Object Manager / author / rootkit driver / driver / Director of Engineering / Thread Manager / computer scientist / Configuration Manager / computer scientist at the NSA / O Manager / co-author / /

ProvinceOrState

Mississippi / /

PublishedMedium

the IEEE IA Workshop proceedings / Phrack / /

Region

Central Florida / /

Technology

defensive malicious code technologies / AV / UNIX / API / operating system / /

SocialTag