this is for holding javascript data
Igor.Korkin edited 4.2. Analysis of Current Approaches to Rootkit Detection in Face of Oppositions.tex
over 9 years ago
Commit id: 1a1517c2a5b806b1638409fda734a531c20297e8
deletions | additions
diff --git a/4.2. Analysis of Current Approaches to Rootkit Detection in Face of Oppositions.tex b/4.2. Analysis of Current Approaches to Rootkit Detection in Face of Oppositions.tex
index 0cb3dba..b9aa2a6 100644
--- a/4.2. Analysis of Current Approaches to Rootkit Detection in Face of Oppositions.tex
+++ b/4.2. Analysis of Current Approaches to Rootkit Detection in Face of Oppositions.tex
...
\subsection{4.2. Analysis \subsection{Analysis of Current Approaches to Rootkit Detection in Face of Oppositions}
One of the most popular ways to detect rootkits at runtime is known as cross-view detection, which relies on the fact that there are several ways to collect the same information about OS objects. Cross-view detection typically utilizes both high-level and low-level mechanisms to collect information [78]. The high-level mechanism is based on standard system functions to enumerate OS objects.