-
1
-
-
56549095956
-
-
The adore Rootkit, http: //lwn.net/Articles/75990/
-
The adore Rootkit, http: //lwn.net/Articles/75990/
-
-
-
-
2
-
-
56549094182
-
-
The Hideme Rootkit, http://www.sophos.com/security/analyses/viruses-and- spyware/trojhidemea.html
-
The Hideme Rootkit
-
-
-
4
-
-
56549091606
-
-
VMware, http://www.vmware.com/
-
VMware
-
-
-
8
-
-
56549093645
-
-
Butler, J.: VICE2.0, http://www.infosecinstitute.com/blog/README_VICE.txt
-
Butler, J.: VICE2.0, http://www.infosecinstitute.com/blog/README_VICE.txt
-
-
-
-
9
-
-
85062418620
-
-
Chen, S., Xu, J., Sezer, E.G., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proc. USENIX Security Symposium (August 2005)
-
Chen, S., Xu, J., Sezer, E.G., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proc. USENIX Security Symposium (August 2005)
-
-
-
-
11
-
-
38149053957
-
-
Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots. In: Krucgcl, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
-
Jiang, X., Wang, X.: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. In: Krucgcl, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
84991799247
-
-
Petroni, N., Fraser, T., Walters, A., Arbaugh, W.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proc. of the 15th USENIX Security Symposium (August 2006)
-
Petroni, N., Fraser, T., Walters, A., Arbaugh, W.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proc. of the 15th USENIX Security Symposium (August 2006)
-
-
-
-
14
-
-
50249114395
-
Automated Detection of Persistent Kernel Control-Flow Attacks
-
October
-
Petroni, N., Hicks, M.: Automated Detection of Persistent Kernel Control-Flow Attacks. In: Proc. of ACM CCS 2007 (October 2007)
-
(2007)
Proc. of ACM CCS
-
-
Petroni, N.1
Hicks, M.2
-
15
-
-
85084162914
-
-
Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th USENIX Security Symposium (August 2004)
-
Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th USENIX Security Symposium (August 2004)
-
-
-
-
19
-
-
56549085389
-
-
sd.: Linux on-the-fly kernel patching without LKM. Phrack 11(58), article 7 of 15 (2001)
-
sd.: Linux on-the-fly kernel patching without LKM. Phrack 11(58), article 7 of 15 (2001)
-
-
-
-
20
-
-
70449824733
-
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Sec Visor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proc, of the ACM SOSP 2007 (October 2007)
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Sec Visor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proc, of the ACM SOSP 2007 (October 2007)
-
-
-
-
21
-
-
27544461178
-
-
Wang, Y., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Stridcr GhostBuster. In: Proc. of the 2005 International Conference on Dependable Systems and Networks (June 2005)
-
Wang, Y., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Stridcr GhostBuster. In: Proc. of the 2005 International Conference on Dependable Systems and Networks (June 2005)
-
-
-
-
22
-
-
38149096122
-
-
Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootldt Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 219-235. Springer, Heidelberg (2007)
-
Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootldt Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
85180628591
-
HookFindcr: Identifying and Understanding Malware Hooking Behaviors
-
February
-
Yin, H., Liang, Z., Song, D.: HookFindcr: Identifying and Understanding Malware Hooking Behaviors. In: Proc. of ISOC NDSS 2008 (February 2008)
-
(2008)
Proc. of ISOC NDSS
-
-
Yin, H.1
Liang, Z.2
Song, D.3
-
24
-
-
0038262825
-
-
Zhang, X., Gupta, R., Zhang, Y.: Precise Dynamic Slicing Algorithms. In: Proc. of the IEEE/ACM International Conference on Software Engineering (May 2003)
-
Zhang, X., Gupta, R., Zhang, Y.: Precise Dynamic Slicing Algorithms. In: Proc. of the IEEE/ACM International Conference on Software Engineering (May 2003)
-
-
-
|