-
3
-
-
84880390547
-
-
Fu rootkit. http://www.rootkit.com/project.php?id=12.
-
Fu rootkit
-
-
-
5
-
-
84874346155
-
-
Packet storm. http://packetstormsecurity.org/UNIX/penetration/rootkits/.
-
Packet storm
-
-
-
7
-
-
84857573917
-
-
Sophos anti-rootkit. http://www.sophos.com/products/free-tools/sophos- anti-rootkit.html.
-
Sophos anti-rootkit
-
-
-
8
-
-
60649106321
-
-
Rootkits, part 1 of 3: A growing threat, April 2006. MacAfee AVERT Labs Whitepaper.
-
Rootkits, part 1 of 3: A growing threat, April 2006. MacAfee AVERT Labs Whitepaper.
-
-
-
-
12
-
-
33745963010
-
Live updating operating systems using virtualization
-
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, and Pen-Chung Yew. Live updating operating systems using virtualization. In VEE '06: Proceedings of the 2nd international conference on Virtual execution environments, 2006.
-
(2006)
VEE '06: Proceedings of the 2nd international conference on Virtual execution environments
-
-
Chen, H.1
Chen, R.2
Zhang, F.3
Zang, B.4
Yew, P.-C.5
-
13
-
-
50249142448
-
Cloaker: Hardware Supported Rootkit Concealment
-
Oakland, CA, May
-
Francis M. David, Ellick M. Chan, Jeffrey C. Carlyle, and Roy H. Campbell. Cloaker: Hardware Supported Rootkit Concealment. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
David, F.M.1
Chan, E.M.2
Carlyle, J.C.3
Campbell, R.H.4
-
14
-
-
34547121382
-
The Daikon system for dynamic detection of likely invariants
-
Michael D. Ernst, Jeff H. Perkins, Philip J. Guo, Stephen McCamant, Carlos Pacheco, Matthew S. Tschantz, and Chen Xiao. The Daikon system for dynamic detection of likely invariants. Science of Computer Programming, 2006.
-
(2006)
Science of Computer Programming
-
-
Ernst, M.D.1
Perkins, J.H.2
Guo, P.J.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.S.6
Xiao, C.7
-
15
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP03: ACM Symposium on Operating System Principles, October 2003.
-
(2003)
SOSP03: ACM Symposium on Operating System Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
19
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
May
-
Samuel King, Peter Chen, Yi-Min Wang, Chad Verblowski, Helen J. Wang, and Jacob R. Lorch. Subvirt: Implementing malware with virtual machines. In SP06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
SP06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
King, S.1
Chen, P.2
Wang, Y.-M.3
Verblowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
21
-
-
34547194202
-
Manitou: A layer-below approach to fighting malware
-
Lionel Litty and David Lie. Manitou: a layer-below approach to fighting malware. In ASID, 2006.
-
(2006)
ASID
-
-
Litty, L.1
Lie, D.2
-
23
-
-
85084160699
-
-
Larry McVoy and Carl Staelin. lmbench: portable tools for performance analysis. In ATEC '96: Proceedings of the USENIX Annual Technical Conference, May 1996.
-
Larry McVoy and Carl Staelin. lmbench: portable tools for performance analysis. In ATEC '96: Proceedings of the USENIX Annual Technical Conference, May 1996.
-
-
-
-
25
-
-
84991799247
-
-
Jr. Nick L. Petroni, Timothy Fraser, AAron Walters, and William A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Security '06: Proceedings of the USENIX Security Symposium, 2006.
-
Jr. Nick L. Petroni, Timothy Fraser, AAron Walters, and William A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Security '06: Proceedings of the USENIX Security Symposium, 2006.
-
-
-
-
28
-
-
60649106701
-
Defeating hardware based ram acquisition
-
Joanna Rutkowska. Defeating hardware based ram acquisition. In Blackhat Conference, 2007.
-
(2007)
Blackhat Conference
-
-
Rutkowska, J.1
-
29
-
-
14844291531
-
Xiaolan Zhang, and Leendert van Doorn. Attestation-based policy enforcement for remote access
-
October
-
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, and Leendert van Doorn. Attestation-based policy enforcement for remote access. In ACM Conference on Computer and Communications Security, October 2004.
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Sailer, R.1
Jaeger, T.2
-
30
-
-
85084162270
-
Trent Jaeger, and Leendert van Doorn. Design and implementation of a tcg-based integrity measurement architecture
-
August
-
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In Security04: Proceedings of the 2004 USENIX Security Symposium, August 2004.
-
(2004)
Security04: Proceedings of the 2004 USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
-
31
-
-
84885617227
-
Leendert van Doorn, and Pradeep K. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, and Pradeep K. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP '05: 20th ACM Symposium on Operating System Principles, 2005.
-
(2005)
SOSP '05: 20th ACM Symposium on Operating System Principles
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
-
32
-
-
27544477855
-
-
Elaine Shi, Adrian Perrig, and Leendert van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: IEEE Symposium on Security and Privacy, 2005.
-
Elaine Shi, Adrian Perrig, and Leendert van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: IEEE Symposium on Security and Privacy, 2005.
-
-
-
-
33
-
-
84868903285
-
-
Shellcode Security Research Team, September 2006
-
Shellcode Security Research Team. Registration weakness in linux kernel's binary formats. http://goodfellas.shellcode.com.ar/own/binfmt-en.pdf, September 2006.
-
Registration weakness in linux kernel's binary formats
-
-
-
34
-
-
79960164190
-
Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management
-
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, and Sy-Yen Kuo. Gatekeeper: Monitoring auto-start extensibility points (aseps) for spyware management. In LISA '04: Proceedings of the 18th USENIX conference on System administration, 2004.
-
(2004)
LISA '04: Proceedings of the 18th USENIX conference on System administration
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.-W.5
Huang, Y.6
Kuo, S.-Y.7
-
35
-
-
60649101769
-
-
Jeffrey Wilhelm and Tzi cker Chiueh. A forced sampled execution approach to kernel rootkit identification. In RAID, 2007.
-
Jeffrey Wilhelm and Tzi cker Chiueh. A forced sampled execution approach to kernel rootkit identification. In RAID, 2007.
-
-
-
|