Literatura
Iako je literatura uz seminarski rad navedena na odgovarajućim mjestima unutar samog rada, u ovom odjeljku se ponovo navode svi relevantni izvori uz poveznice na pripadna web sjedišta.
Općenito
[1] McAfee, Inc, Rootkits, Part 1 of 3: The Growing Threat, White Paper, travanj 2006.
[2] S. Cesare, Runtime kernel kmem patching, studeni 1998.
[3] M. Russinovich, Sony, Rootkits and Digital Rights Management Gone Too Far, listopad 2005.
[4] Rootkit.com, Rustock.C, svibanj 2008.
[5] W3Schools, OS Platform Statistics, travanj 2008.
[6] H. D. Moore, Metasploit LLC, Metasploit framework
[7] M. Howard, S. Lipner, The Security Development Lifecycle, Microsoft Press, Washington, 2006.
[8] Microsoft Inc, Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution
[9] Microsoft Inc, The User Account Control WebLog
[10] Primjer uređivanja sustavskog registra pomoću posebnog "boot" CD-a
[11] N. Ivković, Rootkit – alat za prikrivanje napadača u računalnom sustavu, Seminar, 2007.
[12] J. Heasman, Implementing and Detecting a PCI Rootkit, White Paper, 2006.
[13] J. Heasman, Implementing and Detecting an ACPI Rootkit, Black Hat Federal, 2006.
[14] University of Michigan, Microsoft Inc, Subvirt: Implementing malware with virtual machines, 2006.
[15] J. Rutkowska, Introducing Blue Pill, lipanj 2006.
[16] D. A. D. Zovi, Hardware Virtualization Rootkits, Black Hat USA 2006.
[17] K. Marsh, Microsoft Inc, Win32 Hooks, MSDN, srpanj 1993.
[18] D. Alon, Keyboard Spy: implementation and counter measures, svibanj 2005.
[19] D. Matoušek, Firewall Leak – testing
[21] S. B. Schreiber, Interfacing the Native API in Windows 2000, InformIT, srpanj 2001.
[22] M. Pietrek, An In-Depth Look into the Win32 Portable Executable File Format, MSDN Magazine, veljača 2002.
(part 1)
(part 2)
[24] G. Hoglund, J. Butler, Rootkits: Subverting the Windows Kernel, Addison Wesley Professional, 2005.
[25] Rootkit.com
Korištene aplikacije
[1a] M. N. Kupchik, Emergency Boot CD
[2a] P. Nordahl, Offline NT Password & Registry Editor
[3a] D. Nuhagić, nLite
[4a] Winspector software
[5a] SysInternals (Mark Russinovich), Process Explorer
[6a] S. P. Miller, Dependency Walker
[7a] Immunity Inc, Immunity Debugger
[8a] Neuber Software, Security Task Manager
[9a] N. Bozinis, xplorer2
[10a] C. Ghisler, Total Commander
[11a] Safe-Protect, AKR 2.007
[12a] AVG Technologies, AVGAntivirus
[13a] F-Secure, F-Secure Blacklight
[14a] GMER, GMER catchme
[15a] GMER, GMER
[16a] Kaspersky Lab, Kaspersky Antivirus
[17a] NIAPGroup, NIAP Antirootkit
[18a] Usec, USEC Radix