You are here
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR
Title: Principal Investigator
Phone: (734) 955-9005
Title: Contracts Manager
Phone: (734) 955-9005
Email: proposals@cybernet.com
Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can monitor file access and prevent designated sectors from being written, as well as a memory scanner to catch memory resident rootkits. A GUI tool will allow an administrator to configure the device, which can only be accessed from a USB port. A valuable spin-off would be a bootable CD-ROM rootkit detection and repair tool for Windows.
* Information listed above is at the time of submission. *