-
1
-
-
77952409855
-
-
ASPACK SOFTWARE. ASProtect Website
-
ASPACK SOFTWARE. ASProtect Website, http ://www.aspack.com/asprotect. html.
-
-
-
-
2
-
-
21644433634
-
And the art of virtualization
-
New York, NY, USA, ACM Press
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., Ho, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles (New York, NY, USA, 2003), ACM Press, pp. 164-177.
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Xen, W.A.9
-
3
-
-
0034543798
-
An api for runtime code patching
-
BUCK, B., AND HOLLINGSWORTH, J. K. An api for runtime code patching. Int. J. High Perform. Comput. Appl. 14, 4 (2000), 317-329.
-
(2000)
Int. J. High Perform. Comput. Appl.
, vol.14
, Issue.4
, pp. 317-329
-
-
Buck, B.1
Hollingsworth, J.K.2
-
4
-
-
84946403333
-
Hidden processes: The implication for intrusion detection
-
BUTLER, J., UNDERCOFFER, J., AND PINKSTON, J. Hidden processes: the implication for intrusion detection. In Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society (2003), pp. 116-121.
-
(2003)
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
, pp. 116-121
-
-
Butler, J.1
Undercoffer, J.2
Pinkston, J.3
-
6
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
Washington, DC, USA, IEEE Computer Society
-
GIFFIN, J. T., CHRISTODORESCU, M., AND KRUGER, L. Strengthening software self-checksumming via self-modifying code. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference (Washington, DC, USA, 2005), IEEE Computer Society, pp. 23-32.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 23-32
-
-
Giffin, J.T.1
Christodorescu, M.2
Kruger, L.3
-
7
-
-
0031334864
-
A language and compiler for dynamic program instrumentation
-
Washington, DC, USA, IEEE Computer Society
-
HOLLINGSWORTH, J. K., NIAM, O., MILLER, B. P., Xu, Z., GONCALVES, M. J. R., AND ZHENG, L. MDL: A language and compiler for dynamic program instrumentation. In PACT '97: Proceedings of the 1997 International Conference on Parallel Architectures and Compilation Techniques (Washington, DC, USA, 1997), IEEE Computer Society, p. 201.
-
(1997)
PACT '97: Proceedings of the 1997 International Conference on Parallel Architectures and Compilation Techniques
, pp. 201
-
-
Hollingsworth, J.K.1
Niam, O.2
Miller, B.P.3
Xu, Z.4
Goncalves, M.J.R.5
Mdl, Z.L.6
-
9
-
-
21644451617
-
Detecting kernellevel rootkits through binary analysis
-
KRUEGEL, C., ROBERTSON, W., AND VIGNA, G. Detecting kernellevel rootkits through binary analysis. ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference (2004), 91-100.
-
(2004)
ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
10
-
-
84894247776
-
Runtime Packers: The Hidden problem?
-
Las Vegas, USA
-
MORGENSTERN, M., AND BROSCH, T. Runtime Packers: The Hidden Problem? In Black Hat USA (Las Vegas, USA, 2007).
-
(2007)
Black Hat USA
-
-
Morgenstern, M.1
Brosch, T.2
-
11
-
-
77952347007
-
-
PAX TEAM. PaX
-
PAX TEAM. PaX. http://pax.grsecurity.net.
-
-
-
-
12
-
-
77952405499
-
"Shadow Walker": Raising the bar for rootkit detection
-
Tokyo, Japan
-
SPARKS, S., AND BUTLER, J. "Shadow Walker": Raising the bar for rootkit detection. In Black Hat Japan (Tokyo, Japan, 2005).
-
(2005)
Black Hat Japan
-
-
Sparks, S.1
Butler, J.2
-
13
-
-
77950841228
-
New security enhancements in red hat enterprise linux V.3, update 3
-
Red Hat, Inc.
-
VAN DE VEN, A. New security enhancements in red hat enterprise linux V.3, update 3. Tech. rep., Red Hat, Inc., 2004.
-
(2004)
Tech. Rep.
-
-
Van De Ven, A.1
-
14
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
VAN OORSCHOT, P. C., SOMAYAJI, A., AND WURSTER, G. Hardware-assisted circumvention of self-hashing software tamper resistance. IEEE Trans. Dependable Secur. Comput. 2, 2 (2005), 82-92.
-
(2005)
IEEE Trans. Dependable Secur. Comput. 2
, vol.2
, pp. 82-92
-
-
Van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
-
15
-
-
84864559630
-
First draft of a report on the EDVAC
-
VON NEUMANN, J. First draft of a report on the EDVAC. IEEE Ann. Hist. Comput. 15, 4 (1993), 27-75.
-
(1993)
IEEE Ann. Hist. Comput.
, vol.15
, Issue.4
, pp. 27-75
-
-
Von Neumann, J.1
-
16
-
-
24344490175
-
A generic attack on checksumming-based software tamper resistance
-
IEEE Computer Society
-
WURSTER, G., VAN OORSCHOT, P., AND SOMAYAJI, A. A generic attack on checksumming-based software tamper resistance. In IEEE Symposium on Security and Privacy (2005), IEEE Computer Society, pp. 127-138.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 127-138
-
-
Wurster, G.1
Van Oorschot, P.2
Somayaji, A.3
|