-
1
-
-
70349655953
-
-
Stealth, adore-0.42. http://stealth.7350.org/rootkits.
-
adore-0.42
-
-
-
2
-
-
70349693552
-
adore-ng-0.53
-
Stealth, "adore-ng-0.53," http://stealth.7350.org/rootkits.
-
-
-
-
3
-
-
84880390547
-
-
fuzen op, "FU rootkit," https://www.rootkit.com/vault/fuzen op/FU Rootkit.zip.
-
FU rootkit
-
-
fuzen op1
-
4
-
-
70349684248
-
-
P. Silverman and C.H.A.O.S., FUTo, http://www.rootkit.com/ newsread.php?newsid=433.
-
P. Silverman and C.H.A.O.S., "FUTo," http://www.rootkit.com/ newsread.php?newsid=433.
-
-
-
-
5
-
-
70349678154
-
-
Fanbot, "W32/Fanbot.A@mm," http://www.symantec.com/security response/writeup.jsp?docid=2005-101715-5745-99.
-
W32/Fanbot.A@mm
-
-
Fanbot1
-
7
-
-
41149103393
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
ACM
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes,"in SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, ACM, 2007.
-
(2007)
SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
9
-
-
85084162914
-
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor
-
August
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor," in Proceedings for the 13th USENIX Security Symposium, August 2004.
-
(2004)
Proceedings for the 13th USENIX Security Symposium
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
10
-
-
50249114395
-
Automated Detection of Persistent Kernel Control-Flow Attacks
-
New York, NY, USA, pp, ACM
-
N. L. Petroni and M. Hicks, "Automated Detection of Persistent Kernel Control-Flow Attacks," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, (New York, NY, USA), pp. 103-115, ACM, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 103-115
-
-
Petroni, N.L.1
Hicks, M.2
-
12
-
-
70349672780
-
-
N. Murilo and K. Steding-Jessen, chkrootkit V. 0.47, http://www. chkrootkit.org.
-
N. Murilo and K. Steding-Jessen, "chkrootkit V. 0.47," http://www. chkrootkit.org.
-
-
-
-
13
-
-
70349652908
-
-
F-Secure, F-Secure Blacklight, http://www.f-secure.com/ blacklight/ blacklight.html.
-
F-Secure, "F-Secure Blacklight," http://www.f-secure.com/ blacklight/ blacklight.html.
-
-
-
-
14
-
-
70349658159
-
-
B. Cogswell and M. Russinovich, RootkitRevealer v1.71, http://www. microsoft.com/technet/sysinternals/utilities/RootkitRevealer.mspx.
-
B. Cogswell and M. Russinovich, "RootkitRevealer v1.71," http://www. microsoft.com/technet/sysinternals/utilities/RootkitRevealer.mspx.
-
-
-
-
15
-
-
70349666617
-
-
pjf , IceSword 1.20, http://www.blogcn.com/user17/pjf/index. html.
-
pjf , "IceSword 1.20," http://www.blogcn.com/user17/pjf/index. html.
-
-
-
-
20
-
-
33845381672
-
Linux on-the-fly kernel patching without LKM
-
http: //www.phrack.org/issues.html?id=7&issue=58
-
devik and sd, "Linux on-the-fly kernel patching without LKM," http: //www.phrack.org/issues.html?id=7&issue=58.
-
-
-
devik1
sd2
-
22
-
-
50249101677
-
Lares: An Architecture for Secure Active Monitoring Using Virtualization
-
Oakland, CA, USA, IEEE Computer Society
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An Architecture for Secure Active Monitoring Using Virtualization," in Oakland '08: Proceedings of 2008 IEEE Symposium on Security and Privacy, (Oakland, CA, USA), IEEE Computer Society, 2008.
-
(2008)
Oakland '08: Proceedings of 2008 IEEE Symposium on Security and Privacy
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
23
-
-
84991799247
-
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
-
Vancouver, B.C, Canada, July
-
N. L. Petroni, T. Fraser, A. Walters, and W. A. Arbaugh, "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data," in Proceedings for the 15th USENIX Security Symposium, (Vancouver, B.C., Canada), July 2006.
-
(2006)
Proceedings for the 15th USENIX Security Symposium
-
-
Petroni, N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
25
-
-
85062418620
-
Non-Control- Data Attacks Are Realistic Threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, "Non-Control- Data Attacks Are Realistic Threats," in SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, 2005.
-
(2005)
SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
26
-
-
21644447484
-
Accmon: Automatically detecting memoryrelated bugs via program counter-based invariants
-
P. Zhou and W. Liu and F. Long and S. Lu and F. Qin and Y. Zhou and S. Midkiff and J. Torrellas, "Accmon: Automatically detecting memoryrelated bugs via program counter-based invariants," in MICRO-37:Proceedings of the 37th International Symposium on Microarchitecture,2004.
-
(2004)
MICRO-37:Proceedings of the 37th International Symposium on Microarchitecture
-
-
Zhou, P.1
Liu, W.2
Long, F.3
Lu, S.4
Qin, F.5
Zhou, Y.6
Midkiff, S.7
Torrellas, J.8
|