Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
168 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 47-60, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
128 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 107-128, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
116 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 202-213, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
111 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 137-157, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
99 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 296-310, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
99 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 219-235, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
94 | Sébastien Josse |
Rootkit detection from outside the Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 113-123, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 403-416, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
64 | Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson |
Timely Rootkit Detection During Live Response. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 139-148, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
live response, Rootkit detection |
59 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), November 8-12, 2008, Lake Como, Italy, pp. 106-116, 2008, IEEE Computer Society, 978-1-4244-2836-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 48-67, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
57 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 887-894, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
52 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Automatic Inference and Enforcement of Kernel Data Structure Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 77-86, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 369-384, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 91-100, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Woei-Jiunn Tsaur, Yuh-Chen Chen |
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom/PASSAT ![In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010, pp. 842-848, 2010, IEEE Computer Society, 978-0-7695-4211-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
47 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards a tamper-resistant kernel rootkit detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 276-283, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, kernel rootkit, intrusion detection, Linux |
42 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 74-81, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 125-134, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
40 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 89-105, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
40 | Matt Bishop, Deborah A. Frincke |
Who Owns Your Computer? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 61-63, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Sony, BMG, First4Internet, education, digital rights management, DRM, rootkit |
40 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 24-32, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rootkits, rootkit, Invasive software |
40 | Edward W. Felten, J. Alex Halderman |
Digital Rights Management, Spyware, and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 18-23, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP |
40 | Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 1-16, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dynamic root of trust, self-check-summing code, software-based code attestation, verifiable code execution, rootkit detection |
35 | Zhiqiang Lin, Ryan D. Riley, Dongyan Xu |
Polymorphing Software by Randomizing Data Structure Layout. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 107-126, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 21-38, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Timothy Fraser, Matthew R. Evenson, William A. Arbaugh |
VICI Virtual Machine Introspection for Cognitive Immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 87-96, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 131-143, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
24 | Xingyu hu, Ming Huang, Youhua Xue, Lifeng Jiang, Yao Liu, Guoqi Xie |
Drootkit: Kernel-Level Rootkit Detection and Recovery Based on eBPF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 33(4), pp. 2450073:1-2450073:18, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Suresh Kumar S, Sudalai Muthu T |
Volatile Kernel Rootkit hidden process detection in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 12(1), pp. 164, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Andres Intriago, Shamik Sengupta, Charalambos Konstantinou |
Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.18667, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Nadim, Wonjun Lee, David Akopian |
Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.00473, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, Vassilis C. Nikolaidis, Charalambos Konstantinou |
Behind Closed Doors: Process-Level Rootkit Attacks in Cyber-Physical Microgrid Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.09831, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
24 | Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ |
Phase space power analysis for PC-based rootkit detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18 - 20, 2022, pp. 82-90, 2022, ACM, 978-1-4503-8697-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Michal Szaknis, Krzysztof Szczypiorski |
The design of the simple SMM rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
icWCSN ![In: icWCSN 2022: 9th international Conference on Wireless Communication and Sensor Networks, Dalian, China, January 11 - 13, 2022, pp. 47-56, 2022, ACM, 978-1-4503-9621-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Duy-Phuc Pham, Damien Marion 0001, Annelie Heuser |
ULTRA: Ultimate Rootkit Detection over the Air. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 232-251, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Duy-Phuc Pham |
Leveraging side-channel signals for IoT malware classification and rootkit detection. (Analyse de malware en utilisant des techniques d'attaques par canaux auxiliaires). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
24 | Roland Nagy, Krisztián Németh, Dorottya Papp, Levente Buttyán |
Rootkit Detection on Embedded IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Acta Cybern. ![In: Acta Cybern. 25(2), pp. 369-400, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | R. Geetha Ramani, S. Suresh Kumar |
Nonvolatile kernel rootkit detection using cross-view clean boot in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 33(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Yong-Gang Li, Yeh-Ching Chung, Kai Hwang 0001, Yue-Jin Li |
Virtual Wall: Filtering Rootkit Attacks To Protect Linux Kernel Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 70(10), pp. 1640-1653, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Joseph Connelly, Taylor Roberts, Xing Gao 0001, Jidong Xiao, Haining Wang, Angelos Stavrou |
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021, Taipei, Taiwan, June 21-24, 2021, pp. 350-362, 2021, IEEE, 978-1-6654-3572-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Nadim, Wonjun Lee, David Akopian |
Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBMU ![In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2021, MOBMU 2021, online, January 11-28, 2021, pp. 1-6, 2021, Society for Imaging Science and Technology. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Ioannis Zografopoulos, Charalambos Konstantinou |
Stealthy Rootkit Attacks on Cyber-Physical Microgrids: Poster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Energy ![In: e-Energy '21: The Twelfth ACM International Conference on Future Energy Systems, Virtual Event, Torino, Italy, 28 June - 2 July, 2021., pp. 294-295, 2021, ACM, 978-1-4503-8333-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Stylianos Karagiannis, Alexandros Tokatlis, Sotiris Pelekis, Michael Kontoulis, George Doukas, Christos Ntanos, Emmanouil Magkos |
A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCI ![In: PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26 - 28, 2021, pp. 328-333, 2021, ACM, 978-1-4503-9555-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Guangyuan Hu, Tianwei Zhang 0004, Ruby B. Lee |
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASP@MICRO ![In: HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020, pp. 6:1-6:9, 2020, ACM, 978-1-4503-8898-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay 0001 |
Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: GLSVLSI '20: Great Lakes Symposium on VLSI 2020, Virtual Event, China, September 7-9, 2020, pp. 433-438, 2020, ACM, 978-1-4503-7944-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Donghai Tian, Rui Ma 0004, Xiaoqi Jia, Changzhen Hu |
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 91657-91666, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ohmin Kwon 0001, Hyun Kwon, Hyunsoo Yoon |
Rootkit inside GPU Kernel Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 102-D(11), pp. 2261-2264, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Liwei Zhou, Yiorgos Makris |
Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2018 Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 19-23, 2018, pp. 1580-1585, 2018, IEEE, 978-3-9819263-0-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Chaoyuan Cui, Yun Wu, Yonggang Li, Bingyu Sun |
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(3), pp. 1722-1741, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hyungon Moon, Hojoon Lee 0001, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang |
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 14(2), pp. 145-157, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Luis Garcia 0001, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz |
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017, 2017, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively |
Rootkit detection through phase-space analysis of power voltage measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 12th International Conference on Malicious and Unwanted Software, MALWARE 2017, Fajardo, PR, USA, October 11-14, 2017, pp. 19-27, 2017, IEEE Computer Society, 978-1-5386-1436-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Zhiqiang Zhu, Zhiyuan Zhao, Lei Sun, Jie Yang |
虚拟化环境下基于职能分离的Rootkit检测系统架构研究 (Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(Z6), pp. 348-352, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Chen Chen 0057, Darius Suciu, Radu Sion |
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1781-1783, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim |
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016., pp. 37-51, 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Andrew Case, Golden G. Richard III |
Advancing Mac OS X rootkit detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 14 Supplement 1, pp. S25-S33, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh |
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 31(2), pp. 455-473, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | K. Muthumanickam, E. Ilavarasan |
Optimization of rootkit revealing system resources - A game theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 27(4), pp. 386-392, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Igor Korkin, Ivan Nesterov |
Applying Memory Forensics to Rootkit Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1506.04129, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Zhiyuan Zhao, Zhiqiang Zhu, Lei Sun, Kexin Ma |
虚拟化环境中基于神经网络专家系统的Rootkit检测方法研究 (Research on Rootkit Detection Method Based on Neural Network Expert System in Virtualized Environment). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(8), pp. 175-179, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Lei Sun, Zhiyuan Zhao, Feiran Wang, Lei Jin |
Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers, pp. 437-447, 2015, Springer, 978-3-319-27050-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Toby J. Richer, Grant Neale, Grant Osborne |
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 35-44, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Seyyedeh Atefeh Musavi, Mehdi Kharrazi |
Back to Static Analysis for Kernel-Level Rootkit Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 9(9), pp. 1465-1476, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Joshua Schiffman, David Kaplan |
The SMM Rootkit Revisited: Fun with USB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014, pp. 279-286, 2014, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Shawn Embleton, Sherri Sparks, Cliff Changchun Zou |
SMM rootkit: a new breed of OS independent malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(12), pp. 1590-1605, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ryan D. Riley |
A framework for prototyping and testing data-only rootkit attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 37, pp. 62-71, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Xiongwei Xie, Weichao Wang |
Rootkit detection on virtual machines through deep information extraction at hypervisor-level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013, pp. 498-503, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Miroslaw Skrzewski |
Monitoring System's Network Activity for Rootkit Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks, 20th International Conference, CN 2013, Lwówek Śląski, Poland, June 17-21, 2013. Proceedings, pp. 157-165, 2013, Springer, 978-3-642-38864-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Stefan Vömel, Hermann Lenz |
Visualizing Indicators of Rootkit Infections in Memory Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMF ![In: Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013, pp. 122-139, 2013, IEEE Computer Society, 978-1-4673-6307-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim |
A Brief Survey on Rootkit Techniques in Malicious Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 2(3/4), pp. 134-147, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Woei-Jiunn Tsaur |
Strengthening digital rights management using a new driver-hidden rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 58(2), pp. 479-483, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
Tracking Rootkit Footprints with a Practical Memory Analysis System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, pp. 601-615, 2012, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Adrian Pauna |
Improved self adaptive honeypots capable of detecting rootkit malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMM ![In: 9th International Conference on Communications, COMM 2012, Bucharest, Romania, June 21-23, 2012, pp. 281-284, 2012, IEEE, 978-1-4577-0057-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Chandrabhanu Mahapatra, S. Selvakumar 0001 |
An online cross view difference and behavior based kernel rootkit detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 36(4), pp. 1-9, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Anthony Desnos, Eric Filiol, Ivan Lefou |
Detecting (and creating !) a HVM rootkit (aka BluePill-like). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 7(1), pp. 23-49, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Matthias Schmidt 0001, Lars Baumgärtner, Pablo Graubner, David Böck, Bernd Freisleben |
Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2011, Ayia Napa, Cyprus, 9-11 February 2011, pp. 603-610, 2011, IEEE Computer Society, 978-0-7695-4328-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong |
KVM-based Detection of Rootkit Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011, pp. 703-708, 2011, IEEE Computer Society, 978-1-4577-1908-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Dong-Hoon You, Bong-Nam Noh |
Android platform based linux kernel rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pp. 79-87, 2011, IEEE Computer Society, 978-1-4673-0033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Bryan Dixon, Shivakant Mishra |
On rootkit and malware detection in smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN Workshops ![In: IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28 - July 1, 2010., pp. 162-163, 2010, IEEE Computer Society, 978-1-4244-7729-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 75-80, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
24 | Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001 |
Return-Oriented Rootkit without Returns (on the x86). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings, pp. 340-354, 2010, Springer, 978-3-642-17649-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Satyajit Grover, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, Michael E. Kounavis |
RKRD: Runtime Kernel Rootkit Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers, pp. 224-236, 2008, 978-3-642-05196-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | O. Esoul |
VMX-rootkit : implementing malware with hardware virtual machine extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
24 | Ken Dunham |
OrderGun.A: A Sophisticated Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 16(2), pp. 123-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ken Chiang, Levi Lloyd |
A Case Study of the Rustock Rootkit and Spam Bot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotBots ![In: First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Felix C. Freiling, Bastian Schwittay |
Towards Reliable Rootkit Detection in Live Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMF ![In: IT-Incidents Management & IT-Forensics - IMF 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany, pp. 125-143, 2007, GI, 978-3-88579-208-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Michael Bowman, Heath D. Brown, Paul Pitt |
An undergraduate rootkit research project: How available? How hard? How dangerous? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 7:1-7:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ken Dunham |
Year of the Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 15(6), pp. 2-6, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Markus Hansen |
DRM-Desaster: Das Sony BMG-Rootkit - Dubiose DRM-Software unterwandert System-Sicherheit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 30(2), pp. 95-97, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Jesse D. Kornblum |
Exploiting the Rootkit Paradox with Windows Memory Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. EVid. ![In: Int. J. Digit. EVid. 5(1), 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Yi-Min Wang, Doug Beck |
Fast User-Mode Rootkit Scanner for the Enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA, pp. 23-30, 2005, USENIX. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | John G. Levine |
A Methodology for Detecting and Classifying Rootkit Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
24 | Kyechan Lee, Kyubum Wee |
Detection of Loadable Kernel Module Rootkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2, pp. 385-389, 2003, CSREA Press, 1-932415-17-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
22 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 214-220, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
22 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 304-325, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Dynamic Analysis, Emulator, Rootkit |
22 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
A novel approach for a file-system integrity monitor tool of Xen virtual machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 194-202, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, intrusion detection, Linux, rootkit |
22 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 103-115, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
22 | Doug Wampler, James Graham |
A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 107-116, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Linux forensics, outlier analysis, rootkit detection |