Final changes and final PDF

This commit is contained in:
h3xduck
2022-06-23 15:17:02 -04:00
parent ff1e92dd6b
commit 2c7b6b9ecf
6 changed files with 6 additions and 5 deletions

View File

@@ -36,7 +36,7 @@ after a system reboot, without further user interaction or the need of a
new compromise. The techniques used for achieving both of these
capabilities depend on the type of rootkit developed. One of the most
commmon classifications is based on the level of privileges on which the
rootkit operates in the system:
rootkit operates in the system \cite{rootkit_ptsecurity}:
\begin{itemize}
\item \textbf{User-mode} rootkits run at the same level of privilege as
common user applications. They usually work by hijacking legitimate