At Black Hat this year I had the pleasure of attending a talk given by Joanna Rutkowska. It was one of the best talks that I witnessed at the conference. Rutkowska had proposed a taxonomy that could be applied against stealth malware.
Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and to talk about malware in general. Now I decided to explain this classification a bit more as well as extend it of a new type of malware – the type III malware.
For her article please refer to the paper here (.pdf)
[tags]Joanna Rutkowska, Malware Taxonomy, Malware, Black Hat[/tags]