Back to Search Start Over

Strengthening digital rights management using a new driver-hidden rootkit.

Authors :
Tsaur, Woei-Jiunn
Source :
IEEE Transactions on Consumer Electronics; May2012, Vol. 58 Issue 2, p479-483, 0p
Publication Year :
2012

Abstract

It can be observed that a rootkit may be used to conceal the digital rights management (DRM) software, which is aptly installed in consumers' computers to prevent unauthorized copying. In order to prevent unauthorized users from deleting the digital right management software by employing anti-rootkit tools to remove the rootkit, we develop a new driver-hidden rootkit to strengthen digital right management in this paper. The proposed driver-hidden rootkit is constructed using the technique of DKOM (Direct Kernel Object Manipulation), and have verified that it can successfully avoid a variety of well-known rootkit detectors. Our contributions are twofold. First, we can use the proposed new rootkit technology to extend the protection of the DRM software. Second, the stealth tricks of the proposed sophisticated driver-hidden rootkit can be a great inspiration to defenders who need to effectively strengthen the legitimate uses. [ABSTRACT FROM PUBLISHER]

Details

Language :
English
ISSN :
00983063
Volume :
58
Issue :
2
Database :
Complementary Index
Journal :
IEEE Transactions on Consumer Electronics
Publication Type :
Academic Journal
Accession number :
77681172
Full Text :
https://doi.org/10.1109/TCE.2012.6227450