The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for rootkits with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2006 (18) 2007 (18) 2008 (15) 2009-2010 (17) 2011-2015 (21) 2016-2020 (16) 2022-2024 (3)
Publication types (Num. hits)
article(26) incollection(5) inproceedings(77)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 95 occurrences of 60 keywords

Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
141Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato Hypervisor-based prevention of persistent rootkits. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF persistent rootkit, security, file system, hypervisor
141Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
132Jinku Li, Zhi Wang 0004, Xuxian Jiang, Michael C. Grace, Sina Bahram Defeating return-oriented rootkits with "Return-Less" kernels. Search on Bibsonomy EuroSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF return-less kernel, return-oriented rootkits, defense
132Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF offline analysis, Rootkits, rootkit detection, live analysis
108Julian B. Grizzard, John G. Levine, Henry L. Owen Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
99Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
99Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
99Arati Baliga, Vinod Ganapathy, Liviu Iftode Automatic Inference and Enforcement of Kernel Data Structure Invariants. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
91Ryan D. Riley, Xuxian Jiang, Dongyan Xu Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
74Ha Jin Hwang An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware, virus, spyware, Rootkit
66Ryan D. Riley, Xuxian Jiang, Dongyan Xu Multi-aspect profiling of kernel rootkit behavior. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel rootkit, profiling, malware
66Vikas R. Vasisht, Hsien-Hsin S. Lee SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65John G. Levine, Julian B. Grizzard, Henry L. Owen Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rootkits, rootkit, Invasive software
65Sandra Ring, Eric Cole Taking a Lesson from Stealthy Rootkits. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF reverse engineering, rootkits, malicious code, software obfuscation
58Doug Wampler, James Graham A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linux forensics, outlier analysis, rootkit detection
58Lifu Wang, Partha Dasgupta Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Christopher Krügel, William K. Robertson, Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel Rootkit-resistant disks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, storage, labels, rootkits
50Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell Cloaker: Hardware Supported Rootkit Concealment. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating system, rootkit, ARM
50Nick L. Petroni Jr., Michael W. Hicks Automated detection of persistent kernel control-flow attacks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CFI, integrity, virtualization, kernel, rootkit
50John G. Levine, Julian B. Grizzard, Henry L. Owen A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Arati Baliga, Vinod Ganapathy, Liviu Iftode Detecting Kernel-Level Rootkits Using Data Structure Invariants. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Kernel-level rootkits, noncontrol data attacks, invariant inference, static and dynamic program analysis
41Loïc Duflot, Olivier Levillain, Benjamin Morin ACPI: Design Principles and Concerns. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ACPI, trusted platforms, rootkits
41Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF virtual machines, malware detection, rootkits
41David Geer Hackers Get to the Root of the Problem. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Hackers, Rootkits
33Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel mode, Information security, malware, Windows, rootkit
33Éric Lacombe, Frédéric Raynal, Vincent Nicomette Rootkit modeling and experiments under Linux. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan A hypervisor-based system for protecting software runtime memory and persistent storage. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor
33Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch SubVirt: Implementing malware with virtual machines. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 Towards Protecting Sensitive Files in a Compromised System. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani Detecting eBPF Rootkits Using Virtualization and Memory Forensics. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Maryam Mohammadzad, Jaber Karimpour Using rootkits hiding techniques to conceal honeypot functionality. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits. Search on Bibsonomy SP (Workshops) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani 0001 A game-theoretic defensive approach for forensic investigators against rootkits. Search on Bibsonomy Digit. Investig. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Wonjun Lee, Mohammad Nadim Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers. Search on Bibsonomy CSCloud/EdgeCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Prashanth Krishnamurthy, Hossein Salehghaffari, Shiva Duraisamy, Ramesh Karri, Farshad Khorrami Stealthy Rootkits in Smart Grid Controllers. Search on Bibsonomy ICCD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Jacob Taylor, Benjamin P. Turnbull, Gideon Creech Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Toshihiro Yamauchi, Yohei Akao Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Igor Korkin, Satoshi Tanda Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
25Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Julian Rauchberger, Robert Luh, Sebastian Schrittwieser Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. Search on Bibsonomy ICISSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Amrita Milind Honap, Wonjun Lee 0003 Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Jonathan Grimm, Irfan Ahmed 0001, Vassil Roussev, Manish Bhatt, Manpyo Hong Automatic Mitigation of Kernel Rootkits in Cloud Environments. Search on Bibsonomy WISA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke 0001, Thorsten Holz SDN-Guard: Protecting SDN controllers against SDN rootkits. Search on Bibsonomy NFV-SDN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Earle Jennings Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits. Search on Bibsonomy ICRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Xueyang Wang, Ramesh Karri Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Matt Spisak Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
25Robert Buhren, Julian Vetter, Jan Nordholz The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Shabnam Aboughadareh, Christoph Csallner Detecting rootkits with the RAI runtime application inventory. Search on Bibsonomy SSPREW@ACSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
25David Brumley Invisible Intruders: Rootkits in Practice. Search on Bibsonomy login Usenix Mag. The full citation details ... 2015 DBLP  BibTeX  RDF
25Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi MOSKG: countering kernel rootkits with a secure paging mechanism. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Yohei Akao, Toshihiro Yamauchi Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. Search on Bibsonomy IIAI-AAI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Thu Yein Win, Huaglory Tianfield, Quentin Mair Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. Search on Bibsonomy CSCloud The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Christian Röpke 0001, Thorsten Holz SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Xueyang Wang, Ramesh Karri Detecting Kernel Control-Flow Modifying Rootkits. Search on Bibsonomy Network Science and Cybersecurity The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Graham Hili, Keith Mayes, Konstantinos Markantonakis The BIOS and Rootkits. Search on Bibsonomy Secure Smart Embedded Devices, Platforms and Applications The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25David Durham Mitigating exploits, rootkits and advanced persistent threats. Search on Bibsonomy Hot Chips Symposium The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Hiromasa Shimada, Tatsuo Nakajima Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden Rootkits. Search on Bibsonomy UIC/ATC/ScalCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun A Methodology for Hook-Based Kernel Level Rootkits. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Lingchen Zhang, Sachin Shetty, Peng Liu 0005, Jiwu Jing RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. Search on Bibsonomy ESORICS (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Xueyang Wang, Ramesh Karri NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. Search on Bibsonomy DAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl Enhanced side-channel analysis method to detect hardware virtualization based rootkits. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
25Padmaraj M. V. Nair Rootkits. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25E. Eugene Schultz Malicious Code: Rootkits. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Pablo Bravo, Daniel F. García Proactive Detection of Kernel-Mode Rootkits. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Manuel Corregedor, Sebastiaan H. von Solms Implementing Rootkits to Address Operating System Vulnerabilities. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
25Daniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Jeffrey Bickford, Ryan O'Hare, Arati Baliga, Vinod Ganapathy, Liviu Iftode Rootkits on smart phones: attacks, implications and opportunities. Search on Bibsonomy HotMobile The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Markus Kucera, Michael Vetter FPGA-Rootkits. Search on Bibsonomy Intelligent Technical Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Peng Ning Countering kernel rootkits with lightweight hook protection. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Ben Adida, Adam Barth, Collin Jackson Rootkits for JavaScript Environments. Search on Bibsonomy WOOT The full citation details ... 2009 DBLP  BibTeX  RDF
25Ralf Hund, Thorsten Holz, Felix C. Freiling Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2009 DBLP  BibTeX  RDF
25Arati Baliga, Liviu Iftode, Xiaoxin Chen Automated containment of rootkits attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Douglas R. Wampler, James H. Graham A Method for Detecting Windows Rootkits. Search on Bibsonomy CATA The full citation details ... 2008 DBLP  BibTeX  RDF
25Shawn Embleton, Sherri Sparks, Cliff C. Zou SMM rootkits: a new breed of OS independent malware. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Lynn Erla Beegle Rootkits and Their Effects on Information Security. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Manuel Laggner, Eckehard Hermann Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise & Erkennung. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Markus Kucera, Michael Vetter FPGA-Rootkits Hiding Malicious Code inside the Hardware. Search on Bibsonomy WISES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Wilhelm Dolle, Christoph Wegener Windows Rootkits - eine aktuelle Bedrohung. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Wilhelm Dolle, Christoph Wegener Windows Rootkits - und ihre Erkennung. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25James Butler, Sherri Sparks Spyware and Rootkits: The Future Convergence. Search on Bibsonomy login Usenix Mag. The full citation details ... 2004 DBLP  BibTeX  RDF
24Desmond Lobo, Paul A. Watters, Xin Wen Wu RBACS: Rootkit Behavioral Analysis and Classification System. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining, classification, malware, behavioral analysis, rootkits
24Zhi Wang 0004, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Control-Flow Integrity, Hypervisor, Rootkits
24Edward W. Felten, J. Alex Halderman Digital Rights Management, Spyware, and Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP
24Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor
17Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi Secure in-VM monitoring using hardware virtualization. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel integrity, virtual machines, malware, secure monitoring
17Flavio Lombardi, Roberto Di Pietro KvmSec: a security extension for Linux kernel virtual machines. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel virtual machine, integrity, virtual machine, hypervisor, real-time monitoring
17Nicolas Ruff Windows memory forensics. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson Timely Rootkit Detection During Live Response. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF live response, Rootkit detection
17Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan Expanding Malware Defense by Securing Software Installations. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Untrusted code, Software installation, Malicious code, Sandboxing
17Sébastien Josse Rootkit detection from outside the Matrix. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
17Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Anh-Quynh Nguyen, Yoshiyasu Takefuji Towards a tamper-resistant kernel rootkit detector. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, kernel rootkit, intrusion detection, Linux
Displaying result #1 - #100 of 108 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license