![]() |
Volumn , Issue , 2009, Pages 555-565
|
Mapping kernel objects to enable systematic integrity checking
|
Author keywords
Introspection; Kernel integrity; Malware; Memory analysis; Pointer analysis
|
Indexed keywords
DYNAMIC DATA;
FALSE ALARMS;
FUNCTION POINTERS;
HIDDEN OBJECTS;
INTEGRITY CHECKING;
INTER-PROCEDURAL;
KERNEL MEMORY;
MALWARES;
MEMORY ANALYSIS;
PATTERN MATCHING ALGORITHMS;
POINTER ANALYSIS;
POINTS-TO ANALYSIS;
REAL-WORLD;
WINDOWS VISTA;
COMPUTER CRIME;
COMPUTER OPERATING SYSTEMS;
KNOWLEDGE MANAGEMENT;
NETWORK SECURITY;
PATTERN MATCHING;
QUALITY ASSURANCE;
|
EID: 74049158180
PISSN: 15437221
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1653662.1653729 Document Type: Conference Paper |
Times cited : (125)
|
References (31)
|