Star 0

Abstract

As APTs and rootkits become stealthier they utilize advanced evasion techniques to avoid detection by traditional security defense mechanisms. Starting by dissecting the behavior of a latent rootkit attack, we will then offer technical insights into new and unique detection techniques that can help thwart these APTs.