Literatura

Iako je literatura uz seminarski rad navedena na odgovarajućim mjestima unutar samog rada, u ovom odjeljku se ponovo navode svi relevantni izvori uz poveznice na pripadna web sjedišta.

Općenito

[1] McAfee, Inc, Rootkits, Part 1 of 3: The Growing Threat, White Paper, travanj 2006.

[2] S. Cesare, Runtime kernel kmem patching, studeni 1998.

[3] M. Russinovich, Sony, Rootkits and Digital Rights Management Gone Too Far, listopad 2005.

[4] Rootkit.com, Rustock.C, svibanj 2008.

[5] W3Schools, OS Platform Statistics, travanj 2008.

[6] H. D. Moore, Metasploit LLC, Metasploit framework

[7] M. Howard, S. Lipner, The Security Development Lifecycle, Microsoft Press, Washington, 2006.

[8] Microsoft Inc, Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution

[9] Microsoft Inc, The User Account Control WebLog

[10] Primjer uređivanja sustavskog registra pomoću posebnog "boot" CD-a

[11] N. Ivković, Rootkit – alat za prikrivanje napadača u računalnom sustavu, Seminar, 2007.

[12] J. Heasman, Implementing and Detecting a PCI Rootkit, White Paper, 2006.

[13] J. Heasman, Implementing and Detecting an ACPI Rootkit, Black Hat Federal, 2006.

[14] University of Michigan, Microsoft Inc, Subvirt: Implementing malware with virtual machines, 2006.

[15] J. Rutkowska, Introducing Blue Pill, lipanj 2006.

[16] D. A. D. Zovi, Hardware Virtualization Rootkits, Black Hat USA 2006.

[17] K. Marsh, Microsoft Inc, Win32 Hooks, MSDN, srpanj 1993.

[18] D. Alon, Keyboard Spy: implementation and counter measures, svibanj 2005.

[19] D. Matoušek, Firewall Leak – testing

[20] M. Russinovich, D. Solomon, Microsoft Windows Internals, Fourth Edition, Microsoft Press, Washington, 2004.

[21] S. B. Schreiber, Interfacing the Native API in Windows 2000, InformIT, srpanj 2001.

[22] M. Pietrek, An In-Depth Look into the Win32 Portable Executable File Format, MSDN Magazine, veljača 2002.
(part 1)
(part 2)

[23] G. Hunt, D. Brubacher, Microsoft Research, Detours: Binary Interception of Win32 Functions, White Paper, 1999.

[24] G. Hoglund, J. Butler, Rootkits: Subverting the Windows Kernel, Addison Wesley Professional, 2005.

[25] Rootkit.com

 

Korištene aplikacije

[1a] M. N. Kupchik, Emergency Boot CD

[2a] P. Nordahl, Offline NT Password & Registry Editor

[3a] D. Nuhagić, nLite

[4a] Winspector software

[5a] SysInternals (Mark Russinovich), Process Explorer

[6a] S. P. Miller, Dependency Walker

[7a] Immunity Inc, Immunity Debugger

[8a] Neuber Software, Security Task Manager

[9a] N. Bozinis, xplorer2

[10a] C. Ghisler, Total Commander

[11a] Safe-Protect, AKR 2.007

[12a] AVG Technologies, AVGAntivirus

[13a] F-Secure, F-Secure Blacklight

[14a] GMER, GMER catchme

[15a] GMER, GMER

[16a] Kaspersky Lab, Kaspersky Antivirus

[17a] NIAPGroup, NIAP Antirootkit

[18a] Usec, USEC Radix

[19a] Sysinternals, RootkitRevealer

Natrag na vrh