The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Rootkit with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2006 (16) 2007 (17) 2008-2009 (21) 2010-2012 (15) 2013-2016 (17) 2017-2021 (16) 2022-2024 (9)
Publication types (Num. hits)
article(36) inproceedings(72) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 76 occurrences of 48 keywords

Results
Found 111 publication records. Showing 111 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
168Ryan D. Riley, Xuxian Jiang, Dongyan Xu Multi-aspect profiling of kernel rootkit behavior. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel rootkit, profiling, malware
128John G. Levine, Julian B. Grizzard, Henry L. Owen A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
116Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel mode, Information security, malware, Windows, rootkit
111Éric Lacombe, Frédéric Raynal, Vincent Nicomette Rootkit modeling and experiments under Linux. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
99Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell Cloaker: Hardware Supported Rootkit Concealment. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating system, rootkit, ARM
99Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
94Sébastien Josse Rootkit detection from outside the Matrix. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
87Ryan D. Riley, Xuxian Jiang, Dongyan Xu Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel Rootkit-resistant disks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, storage, labels, rootkits
64Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson Timely Rootkit Detection During Live Response. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF live response, Rootkit detection
59Vikas R. Vasisht, Hsien-Hsin S. Lee SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
57Ha Jin Hwang An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware, virus, spyware, Rootkit
52Arati Baliga, Vinod Ganapathy, Liviu Iftode Automatic Inference and Enforcement of Kernel Data Structure Invariants. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Julian B. Grizzard, John G. Levine, Henry L. Owen Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Christopher Krügel, William K. Robertson, Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Woei-Jiunn Tsaur, Yuh-Chen Chen Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit. Search on Bibsonomy SocialCom/PASSAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
47Anh-Quynh Nguyen, Yoshiyasu Takefuji Towards a tamper-resistant kernel rootkit detector. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, kernel rootkit, intrusion detection, Linux
42Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Sherri Sparks, Shawn Embleton, Cliff Changchun Zou A chipset level network backdoor: bypassing host-based firewall & IDS. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network backdoor, rootkit, hardware security
40Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF offline analysis, Rootkits, rootkit detection, live analysis
40Matt Bishop, Deborah A. Frincke Who Owns Your Computer? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sony, BMG, First4Internet, education, digital rights management, DRM, rootkit
40John G. Levine, Julian B. Grizzard, Henry L. Owen Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rootkits, rootkit, Invasive software
40Edward W. Felten, J. Alex Halderman Digital Rights Management, Spyware, and Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP
40Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic root of trust, self-check-summing code, software-based code attestation, verifiable code execution, rootkit detection
35Zhiqiang Lin, Ryan D. Riley, Dongyan Xu Polymorphing Software by Randomizing Data Structure Layout. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Timothy Fraser, Matthew R. Evenson, William A. Arbaugh VICI Virtual Machine Introspection for Cognitive Immunity. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Ruo Ando, Youki Kadobayashi, Yoichi Shinoda Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module
24Xingyu hu, Ming Huang, Youhua Xue, Lifeng Jiang, Yao Liu, Guoqi Xie Drootkit: Kernel-Level Rootkit Detection and Recovery Based on eBPF. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Suresh Kumar S, Sudalai Muthu T Volatile Kernel Rootkit hidden process detection in cloud computing. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Suman Rath, Andres Intriago, Shamik Sengupta, Charalambos Konstantinou Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Mohammad Nadim, Wonjun Lee, David Akopian Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, Vassilis C. Nikolaidis, Charalambos Konstantinou Behind Closed Doors: Process-Level Rootkit Attacks in Cyber-Physical Microgrid Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
24Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ Phase space power analysis for PC-based rootkit detection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Michal Szaknis, Krzysztof Szczypiorski The design of the simple SMM rootkit. Search on Bibsonomy icWCSN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Duy-Phuc Pham, Damien Marion 0001, Annelie Heuser ULTRA: Ultimate Rootkit Detection over the Air. Search on Bibsonomy RAID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Duy-Phuc Pham Leveraging side-channel signals for IoT malware classification and rootkit detection. (Analyse de malware en utilisant des techniques d'attaques par canaux auxiliaires). Search on Bibsonomy 2022   RDF
24Roland Nagy, Krisztián Németh, Dorottya Papp, Levente Buttyán Rootkit Detection on Embedded IoT Devices. Search on Bibsonomy Acta Cybern. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24R. Geetha Ramani, S. Suresh Kumar Nonvolatile kernel rootkit detection using cross-view clean boot in cloud computing. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Yong-Gang Li, Yeh-Ching Chung, Kai Hwang 0001, Yue-Jin Li Virtual Wall: Filtering Rootkit Attacks To Protect Linux Kernel Functions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Joseph Connelly, Taylor Roberts, Xing Gao 0001, Jidong Xiao, Haining Wang, Angelos Stavrou CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. Search on Bibsonomy DSN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Mohammad Nadim, Wonjun Lee, David Akopian Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training. Search on Bibsonomy MOBMU The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Suman Rath, Ioannis Zografopoulos, Charalambos Konstantinou Stealthy Rootkit Attacks on Cyber-Physical Microgrids: Poster. Search on Bibsonomy e-Energy The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Stylianos Karagiannis, Alexandros Tokatlis, Sotiris Pelekis, Michael Kontoulis, George Doukas, Christos Ntanos, Emmanouil Magkos A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study. Search on Bibsonomy PCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Guangyuan Hu, Tianwei Zhang 0004, Ruby B. Lee Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. Search on Bibsonomy HASP@MICRO The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay 0001 Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Donghai Tian, Rui Ma 0004, Xiaoqi Jia, Changzhen Hu A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Ohmin Kwon 0001, Hyun Kwon, Hyunsoo Yoon Rootkit inside GPU Kernel Execution. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Liwei Zhou, Yiorgos Makris Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution. Search on Bibsonomy DATE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Chaoyuan Cui, Yun Wu, Yonggang Li, Bingyu Sun Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Hyungon Moon, Hojoon Lee 0001, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Luis Garcia 0001, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
24Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively Rootkit detection through phase-space analysis of power voltage measurements. Search on Bibsonomy MALWARE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Zhiqiang Zhu, Zhiyuan Zhao, Lei Sun, Jie Yang 虚拟化环境下基于职能分离的Rootkit检测系统架构研究 (Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Chen Chen 0057, Darius Suciu, Radu Sion POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
24Andrew Case, Golden G. Richard III Advancing Mac OS X rootkit detection. Search on Bibsonomy Digit. Investig. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2015 DBLP  BibTeX  RDF
24K. Muthumanickam, E. Ilavarasan Optimization of rootkit revealing system resources - A game theoretic approach. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Igor Korkin, Ivan Nesterov Applying Memory Forensics to Rootkit Detection. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
24Zhiyuan Zhao, Zhiqiang Zhu, Lei Sun, Kexin Ma 虚拟化环境中基于神经网络专家系统的Rootkit检测方法研究 (Research on Rootkit Detection Method Based on Neural Network Expert System in Virtualized Environment). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  BibTeX  RDF
24Lei Sun, Zhiyuan Zhao, Feiran Wang, Lei Jin Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. Search on Bibsonomy ICCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Toby J. Richer, Grant Neale, Grant Osborne On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
24Seyyedeh Atefeh Musavi, Mehdi Kharrazi Back to Static Analysis for Kernel-Level Rootkit Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Joshua Schiffman, David Kaplan The SMM Rootkit Revisited: Fun with USB. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Shawn Embleton, Sherri Sparks, Cliff Changchun Zou SMM rootkit: a new breed of OS independent malware. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Ryan D. Riley A framework for prototyping and testing data-only rootkit attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Xiongwei Xie, Weichao Wang Rootkit detection on virtual machines through deep information extraction at hypervisor-level. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Miroslaw Skrzewski Monitoring System's Network Activity for Rootkit Malware Detection. Search on Bibsonomy CN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Stefan Vömel, Hermann Lenz Visualizing Indicators of Rootkit Infections in Memory Forensics. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim A Brief Survey on Rootkit Techniques in Malicious Codes. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Woei-Jiunn Tsaur Strengthening digital rights management using a new driver-hidden rootkit. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan Tracking Rootkit Footprints with a Practical Memory Analysis System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2012 DBLP  BibTeX  RDF
24Adrian Pauna Improved self adaptive honeypots capable of detecting rootkit malware. Search on Bibsonomy COMM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Chandrabhanu Mahapatra, S. Selvakumar 0001 An online cross view difference and behavior based kernel rootkit detector. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Anthony Desnos, Eric Filiol, Ivan Lefou Detecting (and creating !) a HVM rootkit (aka BluePill-like). Search on Bibsonomy J. Comput. Virol. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Matthias Schmidt 0001, Lars Baumgärtner, Pablo Graubner, David Böck, Bernd Freisleben Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments. Search on Bibsonomy PDP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong KVM-based Detection of Rootkit Attacks. Search on Bibsonomy INCoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Dong-Hoon You, Bong-Nam Noh Android platform based linux kernel rootkit. Search on Bibsonomy MALWARE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Bryan Dixon, Shivakant Mishra On rootkit and malware detection in smartphones. Search on Bibsonomy DSN Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Desmond Lobo, Paul A. Watters, Xin Wen Wu RBACS: Rootkit Behavioral Analysis and Classification System. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining, classification, malware, behavioral analysis, rootkits
24Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001 Return-Oriented Rootkit without Returns (on the x86). Search on Bibsonomy ICICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Satyajit Grover, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, Michael E. Kounavis RKRD: Runtime Kernel Rootkit Detection. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24O. Esoul VMX-rootkit : implementing malware with hardware virtual machine extensions. Search on Bibsonomy 2008   RDF
24Ken Dunham OrderGun.A: A Sophisticated Rootkit. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ken Chiang, Levi Lloyd A Case Study of the Rustock Rootkit and Spam Bot. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
24Felix C. Freiling, Bastian Schwittay Towards Reliable Rootkit Detection in Live Response. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
24Michael Bowman, Heath D. Brown, Paul Pitt An undergraduate rootkit research project: How available? How hard? How dangerous? Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ken Dunham Year of the Rootkit. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Markus Hansen DRM-Desaster: Das Sony BMG-Rootkit - Dubiose DRM-Software unterwandert System-Sicherheit. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jesse D. Kornblum Exploiting the Rootkit Paradox with Windows Memory Analysis. Search on Bibsonomy Int. J. Digit. EVid. The full citation details ... 2006 DBLP  BibTeX  RDF
24Yi-Min Wang, Doug Beck Fast User-Mode Rootkit Scanner for the Enterprise. Search on Bibsonomy LISA The full citation details ... 2005 DBLP  BibTeX  RDF
24John G. Levine A Methodology for Detecting and Classifying Rootkit Exploits. Search on Bibsonomy 2004   RDF
24Kyechan Lee, Kyubum Wee Detection of Loadable Kernel Module Rootkit. Search on Bibsonomy Security and Management The full citation details ... 2003 DBLP  BibTeX  RDF
22Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato Hypervisor-based prevention of persistent rootkits. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF persistent rootkit, security, file system, hypervisor
22Chaoting Xuan, John A. Copeland, Raheem A. Beyah Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic Analysis, Emulator, Rootkit
22Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
22Nick L. Petroni Jr., Michael W. Hicks Automated detection of persistent kernel control-flow attacks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CFI, integrity, virtualization, kernel, rootkit
22Doug Wampler, James Graham A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linux forensics, outlier analysis, rootkit detection
Displaying result #1 - #100 of 111 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license