Research on the Detection Technique of Bootkit

Yu Zhu,Shengli Liu,Honghu Lu,Wenbin Tang
DOI: https://doi.org/10.1117/12.2012668
2013-01-01
Abstract:As the information security is concerned more and more, various defendable and detection tools appear abundantly which effectively protects system from malicious software. But some new malicious software which is more stealthy and devastating comes forth. Bootkit is a typical representation, famous for that it is underlying and injected into the bottom of system. There are few detection methods for Bootkit. New techniques are necessary and imperative to be researched to detect Bootkit. This paper analyzes the current situation of Bootkit and its detection technique, discusses probable location injected by Bootkit. A detection System for Bootkit Starting up before operating system is designed. Then its implement details are described and the effect of the detection system is validated.
What problem does this paper attempt to address?