Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits.  |
SAC  |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
141 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery.  |
RAID  |
2008 |
DBLP DOI BibTeX RDF |
|
132 | Jinku Li, Zhi Wang 0004, Xuxian Jiang, Michael C. Grace, Sina Bahram |
Defeating return-oriented rootkits with "Return-Less" kernels.  |
EuroSys  |
2010 |
DBLP DOI BibTeX RDF |
return-less kernel, return-oriented rootkits, defense |
132 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS)  |
IFIP Int. Conf. Digital Forensics  |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
108 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.  |
ESORICS  |
2004 |
DBLP DOI BibTeX RDF |
|
99 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.  |
ARES  |
2009 |
DBLP DOI BibTeX RDF |
|
99 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation.  |
DIMVA  |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
99 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Automatic Inference and Enforcement of Kernel Data Structure Invariants.  |
ACSAC  |
2008 |
DBLP DOI BibTeX RDF |
|
91 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.  |
RAID  |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification.  |
RAID  |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
74 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits.  |
SERA  |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
66 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior.  |
EuroSys  |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
66 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits.  |
MICRO  |
2008 |
DBLP DOI BibTeX RDF |
|
65 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.  |
IEEE Secur. Priv.  |
2006 |
DBLP DOI BibTeX RDF |
rootkits, rootkit, Invasive software |
65 | Sandra Ring, Eric Cole |
Taking a Lesson from Stealthy Rootkits.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
reverse engineering, rootkits, malicious code, software obfuscation |
58 | Doug Wampler, James Graham |
A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS)  |
IFIP Int. Conf. Digital Forensics  |
2007 |
DBLP DOI BibTeX RDF |
Linux forensics, outlier analysis, rootkit detection |
58 | Lifu Wang, Partha Dasgupta |
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System.  |
AINA Workshops (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis.  |
ACSAC  |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
50 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment.  |
SP  |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
50 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
50 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.  |
IWIA  |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Detecting Kernel-Level Rootkits Using Data Structure Invariants.  |
IEEE Trans. Dependable Secur. Comput.  |
2011 |
DBLP DOI BibTeX RDF |
Kernel-level rootkits, noncontrol data attacks, invariant inference, static and dynamic program analysis |
41 | Loïc Duflot, Olivier Levillain, Benjamin Morin |
ACPI: Design Principles and Concerns.  |
TRUST  |
2009 |
DBLP DOI BibTeX RDF |
ACPI, trusted platforms, rootkits |
41 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
41 | David Geer |
Hackers Get to the Root of the Problem.  |
Computer  |
2006 |
DBLP DOI BibTeX RDF |
Security, Hackers, Rootkits |
33 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation.  |
ICA3PP  |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
33 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux.  |
J. Comput. Virol.  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan |
A hypervisor-based system for protecting software runtime memory and persistent storage.  |
SpringSim  |
2008 |
DBLP DOI BibTeX RDF |
runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor |
33 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines.  |
S&P  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 |
Towards Protecting Sensitive Files in a Compromised System.  |
IEEE Security in Storage Workshop  |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani |
Detecting eBPF Rootkits Using Virtualization and Memory Forensics.  |
ICISSP  |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Maryam Mohammadzad, Jaber Karimpour |
Using rootkits hiding techniques to conceal honeypot functionality.  |
J. Netw. Comput. Appl.  |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig |
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits.  |
SP (Workshops)  |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani 0001 |
A game-theoretic defensive approach for forensic investigators against rootkits.  |
Digit. Investig.  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Wonjun Lee, Mohammad Nadim |
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers.  |
CSCloud/EdgeCom  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Prashanth Krishnamurthy, Hossein Salehghaffari, Shiva Duraisamy, Ramesh Karri, Farshad Khorrami |
Stealthy Rootkits in Smart Grid Controllers.  |
ICCD  |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jacob Taylor, Benjamin P. Turnbull, Gideon Creech |
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits.  |
ARES  |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Toshihiro Yamauchi, Yohei Akao |
Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features.  |
IEICE Trans. Inf. Syst.  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Igor Korkin, Satoshi Tanda |
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access.  |
CoRR  |
2017 |
DBLP BibTeX RDF |
|
25 | Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato |
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters.  |
AsiaCCS  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Julian Rauchberger, Robert Luh, Sebastian Schrittwieser |
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.  |
ICISSP  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Amrita Milind Honap, Wonjun Lee 0003 |
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming.  |
ICISS  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Grimm, Irfan Ahmed 0001, Vassil Roussev, Manish Bhatt, Manpyo Hong |
Automatic Mitigation of Kernel Rootkits in Cloud Environments.  |
WISA  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke 0001, Thorsten Holz |
SDN-Guard: Protecting SDN controllers against SDN rootkits.  |
NFV-SDN  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Earle Jennings |
Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits.  |
ICRC  |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits.  |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.  |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Matt Spisak |
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures.  |
WOOT  |
2016 |
DBLP BibTeX RDF |
|
25 | Robert Buhren, Julian Vetter, Jan Nordholz |
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture.  |
ICICS  |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Shabnam Aboughadareh, Christoph Csallner |
Detecting rootkits with the RAI runtime application inventory.  |
SSPREW@ACSAC  |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.  |
CoRR  |
2015 |
DBLP BibTeX RDF |
|
25 | David Brumley |
Invisible Intruders: Rootkits in Practice.  |
login Usenix Mag.  |
2015 |
DBLP BibTeX RDF |
|
25 | Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi |
MOSKG: countering kernel rootkits with a secure paging mechanism.  |
Secur. Commun. Networks  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Yohei Akao, Toshihiro Yamauchi |
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features.  |
IIAI-AAI  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Thu Yein Win, Huaglory Tianfield, Quentin Mair |
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments.  |
CSCloud  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Christian Röpke 0001, Thorsten Holz |
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks.  |
RAID  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.  |
TrustCom/BigDataSE/ISPA (1)  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis |
Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector.  |
ICISC  |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Detecting Kernel Control-Flow Modifying Rootkits.  |
Network Science and Cybersecurity  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Graham Hili, Keith Mayes, Konstantinos Markantonakis |
The BIOS and Rootkits.  |
Secure Smart Embedded Devices, Platforms and Applications  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | David Durham |
Mitigating exploits, rootkits and advanced persistent threats.  |
Hot Chips Symposium  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Hiromasa Shimada, Tatsuo Nakajima |
Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden Rootkits.  |
UIC/ATC/ScalCom  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun |
A Methodology for Hook-Based Kernel Level Rootkits.  |
ISPEC  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Lingchen Zhang, Sachin Shetty, Peng Liu 0005, Jiwu Jing |
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.  |
ESORICS (2)  |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters.  |
DAC  |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
Enhanced side-channel analysis method to detect hardware virtualization based rootkits.  |
WorldCIS  |
2012 |
DBLP BibTeX RDF |
|
25 | Padmaraj M. V. Nair |
Rootkits.  |
Encyclopedia of Cryptography and Security (2nd Ed.)  |
2011 |
DBLP DOI BibTeX RDF |
|
25 | E. Eugene Schultz |
Malicious Code: Rootkits.  |
Encyclopedia of Information Assurance  |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Pablo Bravo, Daniel F. García |
Proactive Detection of Kernel-Mode Rootkits.  |
ARES  |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Corregedor, Sebastiaan H. von Solms |
Implementing Rootkits to Address Operating System Vulnerabilities.  |
ISSA  |
2011 |
DBLP BibTeX RDF |
|
25 | Daniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener |
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits.  |
Financial Cryptography  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey Bickford, Ryan O'Hare, Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Rootkits on smart phones: attacks, implications and opportunities.  |
HotMobile  |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits.  |
Intelligent Technical Systems  |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Peng Ning |
Countering kernel rootkits with lightweight hook protection.  |
CCS  |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Ben Adida, Adam Barth, Collin Jackson |
Rootkits for JavaScript Environments.  |
WOOT  |
2009 |
DBLP BibTeX RDF |
|
25 | Ralf Hund, Thorsten Holz, Felix C. Freiling |
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms.  |
USENIX Security Symposium  |
2009 |
DBLP BibTeX RDF |
|
25 | Arati Baliga, Liviu Iftode, Xiaoxin Chen |
Automated containment of rootkits attacks.  |
Comput. Secur.  |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Douglas R. Wampler, James H. Graham |
A Method for Detecting Windows Rootkits.  |
CATA  |
2008 |
DBLP BibTeX RDF |
|
25 | Shawn Embleton, Sherri Sparks, Cliff C. Zou |
SMM rootkits: a new breed of OS independent malware.  |
SecureComm  |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Lynn Erla Beegle |
Rootkits and Their Effects on Information Security.  |
Inf. Secur. J. A Glob. Perspect.  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang |
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.  |
Int. J. Inf. Secur. Priv.  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Laggner, Eckehard Hermann |
Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise & Erkennung.  |
Datenschutz und Datensicherheit  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits Hiding Malicious Code inside the Hardware.  |
WISES  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - eine aktuelle Bedrohung.  |
Datenschutz und Datensicherheit  |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - und ihre Erkennung.  |
Datenschutz und Datensicherheit  |
2006 |
DBLP DOI BibTeX RDF |
|
25 | James Butler, Sherri Sparks |
Spyware and Rootkits: The Future Convergence.  |
login Usenix Mag.  |
2004 |
DBLP BibTeX RDF |
|
24 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System.  |
WKDD  |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
24 | Zhi Wang 0004, Xuxian Jiang |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.  |
IEEE Symposium on Security and Privacy  |
2010 |
DBLP DOI BibTeX RDF |
Control-Flow Integrity, Hypervisor, Rootkits |
24 | Edward W. Felten, J. Alex Halderman |
Digital Rights Management, Spyware, and Security.  |
IEEE Secur. Priv.  |
2006 |
DBLP DOI BibTeX RDF |
Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP |
24 | Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh |
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.  |
ICAC  |
2005 |
DBLP DOI BibTeX RDF |
Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor |
17 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization.  |
CCS  |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
17 | Flavio Lombardi, Roberto Di Pietro |
KvmSec: a security extension for Linux kernel virtual machines.  |
SAC  |
2009 |
DBLP DOI BibTeX RDF |
kernel virtual machine, integrity, virtual machine, hypervisor, real-time monitoring |
17 | Nicolas Ruff |
Windows memory forensics.  |
J. Comput. Virol.  |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson |
Timely Rootkit Detection During Live Response. (PDF / PS)  |
IFIP Int. Conf. Digital Forensics  |
2008 |
DBLP DOI BibTeX RDF |
live response, Rootkit detection |
17 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.  |
WKDD  |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations.  |
DIMVA  |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
17 | Sébastien Josse |
Rootkit detection from outside the Matrix.  |
J. Comput. Virol.  |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
17 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards a tamper-resistant kernel rootkit detector.  |
SAC  |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, kernel rootkit, intrusion detection, Linux |