Introducing Stealth Malware Taxonomy

42
Anonymous Reader writes “Joanna Rutkowska, a researcher interested in stealth technology as used by malware and attackers to hide their malicious actions after a successful break-in, released a new paper that discusses several types of malware. At the Black Hat Federal Conference she proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system. This paper goes into more detail.”

Link: net-security.org

Category:

  • Security