At Black Hat this year I had the pleasure of attending a talk given by Joanna Rutkowska. It was one of the best talks that I witnessed at the conference. Rutkowska had proposed a taxonomy that could be applied against stealth malware.

Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and to talk about malware in general. Now I decided to explain this classification a bit more as well as extend it of a new type of malware – the type III malware.

For her article please refer to the paper here (.pdf)

Article Link

[tags]Joanna Rutkowska, Malware Taxonomy, Malware, Black Hat[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.