Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 214-220, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
141 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 21-38, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
132 | Jinku Li, Zhi Wang 0004, Xuxian Jiang, Michael C. Grace, Sina Bahram |
Defeating return-oriented rootkits with "Return-Less" kernels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: European Conference on Computer Systems, Proceedings of the 5th European conference on Computer systems, EuroSys 2010, Paris, France, April 13-16, 2010, pp. 195-208, 2010, ACM, 978-1-60558-577-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
return-less kernel, return-oriented rootkits, defense |
132 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 89-105, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
108 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 369-384, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
99 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 74-81, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
99 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 48-67, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
99 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Automatic Inference and Enforcement of Kernel Data Structure Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 77-86, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
91 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 219-235, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
74 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 887-894, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
66 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 47-60, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
66 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), November 8-12, 2008, Lake Como, Italy, pp. 106-116, 2008, IEEE Computer Society, 978-1-4244-2836-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
65 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 24-32, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rootkits, rootkit, Invasive software |
65 | Sandra Ring, Eric Cole |
Taking a Lesson from Stealthy Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 38-45, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
reverse engineering, rootkits, malicious code, software obfuscation |
58 | Doug Wampler, James Graham |
A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 107-116, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Linux forensics, outlier analysis, rootkit detection |
58 | Lifu Wang, Partha Dasgupta |
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 583-589, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 91-100, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 403-416, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
50 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 296-310, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
50 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 103-115, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
50 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 107-128, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Detecting Kernel-Level Rootkits Using Data Structure Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 8(5), pp. 670-684, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Kernel-level rootkits, noncontrol data attacks, invariant inference, static and dynamic program analysis |
41 | Loïc Duflot, Olivier Levillain, Benjamin Morin |
ACPI: Design Principles and Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 14-28, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ACPI, trusted platforms, rootkits |
41 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 128-138, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
41 | David Geer |
Hackers Get to the Root of the Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(5), pp. 17-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Hackers, Rootkits |
33 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 202-213, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
33 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 137-157, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan |
A hypervisor-based system for protecting software runtime memory and persistent storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 828-835, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor |
33 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 314-327, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 |
Towards Protecting Sensitive Files in a Compromised System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA, pp. 21-28, 2005, IEEE Computer Society, 0-7695-2537-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani |
Detecting eBPF Rootkits Using Virtualization and Memory Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 254-261, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Maryam Mohammadzad, Jaber Karimpour |
Using rootkits hiding techniques to conceal honeypot functionality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 214, pp. 103606, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig |
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022, pp. 265-276, 2022, IEEE, 978-1-6654-9643-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani 0001 |
A game-theoretic defensive approach for forensic investigators against rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 33, pp. 200909, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Wonjun Lee, Mohammad Nadim |
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud/EdgeCom ![In: 7th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2020 / 6th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2020, New York City, NY, USA, August 1-3, 2020, pp. 50-55, 2020, IEEE, 978-1-7281-6550-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Prashanth Krishnamurthy, Hossein Salehghaffari, Shiva Duraisamy, Ramesh Karri, Farshad Khorrami |
Stealthy Rootkits in Smart Grid Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 37th IEEE International Conference on Computer Design, ICCD 2019, Abu Dhabi, United Arab Emirates, November 17-20, 2019, pp. 20-28, 2019, IEEE, 978-1-5386-6648-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jacob Taylor, Benjamin P. Turnbull, Gideon Creech |
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 48:1-48:11, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Toshihiro Yamauchi, Yohei Akao |
Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 100-D(10), pp. 2377-2381, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Igor Korkin, Satoshi Tanda |
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1705.06784, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato |
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pp. 483-493, 2017, ACM, 978-1-4503-4944-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Julian Rauchberger, Robert Luh, Sebastian Schrittwieser |
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017., pp. 346-353, 2017, SciTePress, 978-989-758-209-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Amrita Milind Honap, Wonjun Lee 0003 |
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 107-126, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Grimm, Irfan Ahmed 0001, Vassil Roussev, Manish Bhatt, Manpyo Hong |
Automatic Mitigation of Kernel Rootkits in Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers, pp. 137-149, 2017, Springer, 978-3-319-93562-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke 0001, Thorsten Holz |
SDN-Guard: Protecting SDN controllers against SDN rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017, Berlin, Germany, November 6-8, 2017, pp. 297-302, 2017, IEEE, 978-1-5386-3285-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Earle Jennings |
Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRC ![In: IEEE International Conference on Rebooting Computing, ICRC 2017, Washington, DC, USA, November 8-9, 2017, pp. 1-8, 2017, IEEE, 978-1-5386-1553-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(3), pp. 485-498, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Matt Spisak |
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016., 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Robert Buhren, Julian Vetter, Jan Nordholz |
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, pp. 376-391, 2016, Springer, 978-3-319-50010-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Shabnam Aboughadareh, Christoph Csallner |
Detecting rootkits with the RAI runtime application inventory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSPREW@ACSAC ![In: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016, pp. 3:1-3:12, 2016, ACM, 978-1-4503-4841-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1512.04116, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | David Brumley |
Invisible Intruders: Rootkits in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 40(2), 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi |
MOSKG: countering kernel rootkits with a secure paging mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 3580-3591, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Yohei Akao, Toshihiro Yamauchi |
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIAI-AAI ![In: IIAI 4th International Congress on Advanced Applied Informatics, IIAI-AAI 2015, Okayama, Japan, July 12-16, 2015, pp. 721-722, 2015, IEEE Computer Society, 978-1-4799-9957-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Thu Yein Win, Huaglory Tianfield, Quentin Mair |
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, pp. 295-300, 2015, IEEE Computer Society, 978-1-4673-9300-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Christian Röpke 0001, Thorsten Holz |
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings, pp. 339-356, 2015, Springer, 978-3-319-26361-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ISPA (1) ![In: 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 65-73, 2015, IEEE, 978-1-4673-7952-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis |
Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers, pp. 262-277, 2015, Springer, 978-3-319-30839-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Detecting Kernel Control-Flow Modifying Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Science and Cybersecurity ![In: Network Science and Cybersecurity, pp. 177-187, 2014, Springer, 978-1-4614-7596-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Graham Hili, Keith Mayes, Konstantinos Markantonakis |
The BIOS and Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Smart Embedded Devices, Platforms and Applications ![In: Secure Smart Embedded Devices, Platforms and Applications, pp. 369-381, 2014, Springer, 978-1-4614-7914-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | David Durham |
Mitigating exploits, rootkits and advanced persistent threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hot Chips Symposium ![In: 2014 IEEE Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August 10-12, 2014, pp. 1-39, 2014, IEEE, 978-1-4673-8883-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Hiromasa Shimada, Tatsuo Nakajima |
Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC/ATC/ScalCom ![In: 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014, pp. 441-448, 2014, IEEE Computer Society, 978-1-4799-7646-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun |
A Methodology for Hook-Based Kernel Level Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings, pp. 119-128, 2014, Springer, 978-3-319-06319-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Lingchen Zhang, Sachin Shetty, Peng Liu 0005, Jiwu Jing |
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, pp. 475-493, 2014, Springer, 978-3-319-11211-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013, pp. 79:1-79:7, 2013, ACM, 978-1-4503-2071-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 192-201, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
25 | Padmaraj M. V. Nair |
Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1060, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | E. Eugene Schultz |
Malicious Code: Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Pablo Bravo, Daniel F. García |
Proactive Detection of Kernel-Mode Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 515-520, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Corregedor, Sebastiaan H. von Solms |
Implementing Rootkits to Address Operating System Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings ISSA 2011, 2011, ISSA, Pretoria, South Africa, 978-1-4577-1482-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
25 | Daniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener |
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, pp. 320-327, 2010, Springer, 978-3-642-14576-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey Bickford, Ryan O'Hare, Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Rootkits on smart phones: attacks, implications and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotMobile ![In: Eleventh Workshop on Mobile Computing Systems and Applications, HotMobile '10, Annapolis, Maryland, USA, February 22-23, 2010, pp. 49-54, 2010, ACM, 978-1-4503-0005-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Technical Systems ![In: Intelligent Technical Systems, pp. 261-274, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Peng Ning |
Countering kernel rootkits with lightweight hook protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 545-554, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Ben Adida, Adam Barth, Collin Jackson |
Rootkits for JavaScript Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 3rd USENIX Workshop on Offensive Technologies, WOOT 2009, Montreal, Canada, August 10, 2009, pp. 1-7, 2009, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Ralf Hund, Thorsten Holz, Felix C. Freiling |
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings, pp. 383-398, 2009, USENIX Association, 978-1-931971-69-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Arati Baliga, Liviu Iftode, Xiaoxin Chen |
Automated containment of rootkits attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 27(7-8), pp. 323-334, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Douglas R. Wampler, James H. Graham |
A Method for Detecting Windows Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CATA ![In: Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, CATA 2008, April 9-11, 2008, Cancun, Mexico, pp. 239-243, 2008, ISCA, 978-1-880843-66-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Shawn Embleton, Sherri Sparks, Cliff C. Zou |
SMM rootkits: a new breed of OS independent malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 11, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Lynn Erla Beegle |
Rootkits and Their Effects on Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 16(3), pp. 164-176, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang |
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 1(4), pp. 75-86, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Laggner, Eckehard Hermann |
Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise & Erkennung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 31(11), pp. 822-826, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits Hiding Malicious Code inside the Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISES ![In: Fifth Workshop on Intelligent Solutions in Embedded Systems, WISES 2007, Leganés, Spain, June 21-22, 2007, pp. 262-272, 2007, IEEE, 978-84-89315-47-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - eine aktuelle Bedrohung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 30(8), pp. 471-475, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - und ihre Erkennung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 30(8), pp. 476-480, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | James Butler, Sherri Sparks |
Spyware and Rootkits: The Future Convergence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 29(6), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 75-80, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
24 | Zhi Wang 0004, Xuxian Jiang |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 380-395, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Control-Flow Integrity, Hypervisor, Rootkits |
24 | Edward W. Felten, J. Alex Halderman |
Digital Rights Management, Spyware, and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 18-23, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP |
24 | Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh |
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Second International Conference on Autonomic Computing (ICAC 2005), 13-16 June 2005, Seattle, WA, USA, pp. 263-273, 2005, IEEE Computer Society, 0-7695-2276-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor |
17 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 477-487, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
17 | Flavio Lombardi, Roberto Di Pietro |
KvmSec: a security extension for Linux kernel virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 2029-2034, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel virtual machine, integrity, virtual machine, hypervisor, real-time monitoring |
17 | Nicolas Ruff |
Windows memory forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 83-100, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson |
Timely Rootkit Detection During Live Response. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 139-148, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
live response, Rootkit detection |
17 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 594-600, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 164-185, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
17 | Sébastien Josse |
Rootkit detection from outside the Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 113-123, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 116-127, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
17 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 88-103, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards a tamper-resistant kernel rootkit detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 276-283, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, kernel rootkit, intrusion detection, Linux |