This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated
Reference:
Decloedt, HE and van Heerden, R. 2010. Rootkits, Trojans, backdoors and new developments. Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010, pp 4-11
Decloedt, H., & Van Heerden, R. P. (2010). Rootkits, Trojans, backdoors and new developments. CSIR. Defence Peace Safety and Security. http://hdl.handle.net/10204/4689
Decloedt, HE, and Renier P Van Heerden. "Rootkits, Trojans, backdoors and new developments." (2010): http://hdl.handle.net/10204/4689
Decloedt H, Van Heerden RP, Rootkits, Trojans, backdoors and new developments; CSIR. Defence Peace Safety and Security; 2010. http://hdl.handle.net/10204/4689 .