Turning the tables: Loadable Kernel Module Rootkits deployed in a honeypot environment

Honeypots are one of the latest technologies available to track and monitor hackers and Internet attackers. They can be generally divided into two different areas, production and research honeypots. Honeypots can also be classified by the amount of system interaction they provide to an attacker and...
Jonathan Rose
May 8, 2003

All papers are copyrighted. No re-posting of papers is permitted