메뉴 건너뛰기




Volumn 5, Issue 1, 2007, Pages 67-69

How not to be seen

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL RIGHTS MANAGEMENT (DRM); STEALTH TECHNIQUES;

EID: 33847705743     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.8     Document Type: Article
Times cited : (4)

References (2)
  • 1
    • 33751032041 scopus 로고    scopus 로고
    • SubVirt: Imple menting Malware with Virtual Machines
    • IEEE CS Press
    • S.T. King et al., "SubVirt: Imple menting Malware with Virtual Machines," Proc. 2006 IEEE Symp. Security and Privacy, IEEE CS Press, 2006, pp. 314-327.
    • (2006) Proc. 2006 IEEE Symp. Security and Privacy , pp. 314-327
    • King, S.T.1
  • 2
    • 55549097262 scopus 로고    scopus 로고
    • Subverting Windows Vista Kernel for Fun and Profit
    • Dec
    • J. Rutkowska, "Subverting Windows Vista Kernel for Fun and Profit," Black Hat Briefings presentation, Dec. 2006; http://blackhat.com/ presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.
    • (2006) Black Hat Briefings presentation
    • Rutkowska, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.