-
1
-
-
33751032041
-
-
S.T. King, P.M. Chen, Y-M Wang, C. Verbowski, H.J. Wang, and J.R. Lorch. Subvirt: Implementing malware with virtual machines. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S & P'06), pages 314{327, Washington, DC, USA, 2006. IEEE Computer Society.
-
S.T. King, P.M. Chen, Y-M Wang, C. Verbowski, H.J. Wang, and J.R. Lorch. Subvirt: Implementing malware with virtual machines. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S & P'06), pages 314{327, Washington, DC, USA, 2006. IEEE Computer Society.
-
-
-
-
2
-
-
53349091372
-
-
th Workshop on Hot Topics in Operating Systems, 2007. USENIX.
-
th Workshop on Hot Topics in Operating Systems, 2007. USENIX.
-
-
-
-
3
-
-
55549097262
-
Subverting Vista Kernel for Fun and Profit
-
Presented at, Aug
-
J. Rutkowska. Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, Aug. 2006.
-
(2006)
Black Hat USA
-
-
Rutkowska, J.1
-
8
-
-
35949000051
-
Implementing and Detecting an ACPI BIOS Rootkit
-
Presented at
-
J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal, 2006.
-
(2006)
Black Hat Federal
-
-
Heasman, J.1
-
10
-
-
70249094561
-
-
S. Sparks and J. Butler. Shadow Walker: Raising the Bar for Windows Rootkit Detection. In Phrack 0x0B, Issue 0x3D, Phile #0x08 of 0x14. 2005.
-
S. Sparks and J. Butler. Shadow Walker: Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x14. 2005.
-
-
-
-
11
-
-
33751059942
-
VICE - Catch the Hookers
-
Presented at, Aug
-
J. Butler. VICE - Catch the Hookers. Presented at Black Hat USA. Aug 2004.
-
(2004)
Black Hat USA
-
-
Butler, J.1
-
12
-
-
84988573115
-
-
G. Kim and E. Spafford. The design and implementation of tripwire: a file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and communications security, 1994. ACM Press.
-
G. Kim and E. Spafford. The design and implementation of tripwire: a file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and communications security, 1994. ACM Press.
-
-
-
-
14
-
-
85084162914
-
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor. In Proc. Usenix Security Symposium, Aug. 2004.
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor. In Proc. Usenix Security Symposium, Aug. 2004.
-
-
-
-
15
-
-
84869624239
-
-
8042 Keyboard Controller
-
8042 Keyboard Controller. http://heim.ifi.uio.no/~stanisls/helppc/8042. html
-
-
-
-
16
-
-
84869608987
-
-
Rootkit. http://en.wikipedia.org/wiki/Rootkit. 2007.
-
(2007)
Rootkit
-
-
-
17
-
-
70249103744
-
-
B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1, 2006. http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
-
B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1, 2006. http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
-
-
-
-
19
-
-
0542372739
-
Framework for Modeling Trojans and Computer Virus Infections
-
Thimbleby, S. Anderson, P. Cairns. A Framework for Modeling Trojans and Computer Virus Infections. The Computer Journal, Vol. 41, No. 7, pp. 444-458. 1998.
-
(1998)
The Computer Journal
, vol.41
, Issue.7
, pp. 444-458
-
-
Thimbleby, S.1
Anderson, P.2
Cairns, A.3
-
20
-
-
67651038840
-
* NT Rootkit, patching the NT Kernel
-
* NT Rootkit, patching the NT Kernel. In Phrack Magazine, Vol. 9, No 55, 1999.
-
(1999)
In Phrack Magazine
, vol.9
, Issue.55
-
-
Hoglund, G.1
-
22
-
-
38149023819
-
System Virginity Verifier - Defining the Roadmap for Malware Detection on Windows System
-
Presented at, Sept
-
J. Rutkowska. System Virginity Verifier - Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. Sept 2005.
-
(2005)
Hack In The Box
-
-
Rutkowska, J.1
-
23
-
-
77949482440
-
Hardware Virtualization Rootkits. Presented at Black Hat USA
-
Aug
-
D. A. Zovi. Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug 2006. http://www.theta44.org/software/HVM-Rootkits-ddz-bh-usa-06. pdf
-
(2006)
-
-
Zovi, D.A.1
-
25
-
-
35949000051
-
Implementing and Detecting an ACPI BIOS Rootkit
-
Presented at
-
J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal. 2006.
-
(2006)
Black Hat, Federal
-
-
Heasman, J.1
-
26
-
-
84869630206
-
-
http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf
-
-
-
-
28
-
-
70149125332
-
IsGameOver() Anyone? Presented at Black Hat
-
Aug
-
J. Rutkowska. IsGameOver() Anyone? Presented at Black Hat, USA. Aug 2007.
-
(2007)
USA
-
-
Rutkowska, J.1
-
29
-
-
84869603073
-
-
Windbg. http://en.wikipedia.org/wiki/WinDbg. 2007.
-
(2007)
Windbg
-
-
|