Our proposal is that we will document available methods for loading and executing stealth software, and critically analyze the effectiveness of each approach with regards to the goals of securing against discovery, tampering, or debugging/disassembling. We will select our ideal approach for stealthy software loading and execution and develop the concept into a minimal software prototype for Phase I.
Keywords: Software Protection, Hypervisors, Rootkits, Bios, Covert Channels, Stealth Software, Anti-Piracy, Anti-Reversing