-
1
-
-
0032260307
-
A Framework for Modeling Trojans and Computer Virus Infections
-
Thimbleby H, Anderson S, Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal, 1998;41(7):444-458.
-
(1998)
The Computer Journal
, vol.41
, Issue.7
, pp. 444-458
-
-
Thimbleby, H.1
Anderson, S.2
Cairns, P.3
-
2
-
-
84888405557
-
-
The FU rootkit.
-
Fuzen Op.The FU rootkit.http://www.rootkit.com/project.php?id=12
-
-
-
Fuzen, O.1
-
3
-
-
67651038840
-
A REAL NT Rootkit, patching the NT Kernel
-
Hoglund G.A REAL NT Rootkit, patching the NT Kernel. InPhrack Magazine, Vol.9, No 55 1999.
-
(1999)
Phrack Magazine
, vol.9
, Issue.55
-
-
Hoglund, G.1
-
4
-
-
84888423690
-
-
VICE-Catch the Hookers. Presented at Black Hat USA. August.
-
Butler J.VICE-Catch the Hookers. Presented at Black Hat USA. August2004.
-
(2004)
-
-
Butler, J.1
-
5
-
-
33751032041
-
-
Subvirt: Implementing malware with virtual machines. In Proceedings of IEEE Symposium on Security and Privacy (S & p' 06) pages-, Washington, DC, USA, IEEE Computer Society.
-
King ST, Chen PM, Wang Y-M, Verbowski C, Wang HJ, Lorch JR.Subvirt: Implementing malware with virtual machines. In Proceedings of IEEE Symposium on Security and Privacy (S & p' 06) pages314-327, Washington, DC, USA, 2006; IEEE Computer Society.
-
(2006)
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
6
-
-
84888410159
-
-
Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3B: System Programming Guide, Part 2. May.
-
Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3B: System Programming Guide, Part 2. May2007.
-
(2007)
-
-
-
7
-
-
84888410799
-
-
Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3A: System Programming Guide, Part 1. May.
-
Intel Corporation.Intel 64 and IA-32 Architectures Software Developer's Manual Volume3A: System Programming Guide, Part 1. May2007.
-
(2007)
-
-
-
8
-
-
84888411060
-
-
Butler, Shadow Walker: J. Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x14.
-
Sparks S, Butler, Shadow Walker: J. Raising the Bar for Windows Rootkit Detection. In Phrack Volume 0x0B, Issue 0x3D, Phile #0x08 of 0x142005.
-
(2005)
-
-
Sparks, S.1
-
9
-
-
84888399103
-
-
New Blue Pill
-
Rutkowska J.New Blue Pill.www.bluepillproject.org/stuff/nbp-0.11.zip2007.
-
(2007)
-
-
Rutkowska, J.1
-
10
-
-
84888419873
-
-
Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, August.
-
Rutkowska J.Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, August2006.
-
(2006)
-
-
Rutkowska, J.1
-
11
-
-
84888395189
-
-
Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug;
-
Zovi. DA.Hardware Virtualization Rootkits. Presented at Black Hat USA, Aug2006;www.theta44.org/software/HVM_Rootkits_ddz_bh-usa-06.pdf
-
(2006)
-
-
Zovi, D.A.1
-
12
-
-
84888424302
-
-
Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal,.
-
Heasman J.Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal, 2006.
-
(2006)
-
-
Heasman, J.1
-
13
-
-
84888410604
-
-
RootkitRevealer v1.71. November 1,;
-
Cogswell B, Russinovich M.RootkitRevealer v1.71. November 1, 2006;Http://www.microsoft.com/technet/sysinternals/Utilities/RootkitRevealer.mspx
-
(2006)
-
-
Cogswell, B.1
Russinovich, M.2
-
14
-
-
84888399290
-
-
F-Secure Black Light.
-
F-Secure Black Light.http://www.f-secure.com/blacklight
-
-
-
-
15
-
-
84888415698
-
-
Using CPU system management mode to circumvent operating System security functions. In DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex, France.
-
Duflot L, Etiemble D, Grumelard O.Using CPU system management mode to circumvent operating System security functions. In DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex, France2007.
-
(2007)
-
-
Duflot, L.1
Etiemble, D.2
Grumelard, O.3
-
16
-
-
84888398088
-
-
Intel Corporation.Intel 845GE/845PE Chipset Datasheet. October.
-
Intel Corporation.Intel 845GE/845PE Chipset Datasheet. October2002.
-
(2002)
-
-
-
17
-
-
84888398012
-
-
Intel Corporation.Intel 82801DB I/O Controller Hub 4 (ICH4). May.
-
Intel Corporation.Intel 82801DB I/O Controller Hub 4 (ICH4). May2002.
-
(2002)
-
-
-
18
-
-
84888409771
-
-
Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal
-
Heasman J.Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat, Federal
-
-
-
Heasman, J.1
-
19
-
-
84888395691
-
-
Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional,.
-
Butler J, Hoglund G.Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, 2005.
-
(2005)
-
-
Butler, J.1
Hoglund, G.2
-
20
-
-
84888417180
-
-
8042] Keyboard Controller.heim.ifi.uio.no/
-
[8042] Keyboard Controller.heim.ifi.uio.no/
-
-
-
-
21
-
-
84888414588
-
-
quot;Rootkits vs. Stealth by Design Malware", Presented at Black Hat, Europe.
-
Rutkowska J."Rootkits vs. Stealth by Design Malware", Presented at Black Hat, Europe2006.
-
(2006)
-
-
Rutkowska, J.1
-
22
-
-
84888417457
-
-
Support for USB and Legacy Keyboards and Mouse Devices. December;microsoft.com/whdc/device/input/usbhost.mspx
-
Support for USB and Legacy Keyboards and Mouse Devices. December2001;microsoft.com/whdc/device/input/usbhost.mspx
-
(2001)
-
-
-
23
-
-
84888422873
-
-
www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Heasman.pdf
-
-
-
-
24
-
-
84888395495
-
-
Windbg.en.wikipedia.org/wiki/WinDbg.
-
Windbg.en.wikipedia.org/wiki/WinDbg2007.
-
(2007)
-
-
-
25
-
-
84888407623
-
-
Implementing and detecting a PCI Rootkit. Presented at Black Hat Federal.
-
Heasman J.Implementing and detecting a PCI Rootkit. Presented at Black Hat Federal2007.
-
(2007)
-
-
Heasman, J.1
-
26
-
-
53349091372
-
-
Compatibility is Not Transparency: VMM Detection Mythis and Realities. In HotOS XI: 11th Workshop on Hot Topics in Operating Systems; USENIX.
-
Garfinkel T, Adams K, Warfield A, Franklin J.Compatibility is Not Transparency: VMM Detection Mythis and Realities. In HotOS XI: 11th Workshop on Hot Topics in Operating Systems2007; USENIX.
-
(2007)
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
27
-
-
84888403135
-
-
System Virginity Verifier-Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. September.
-
Rutkowska J.System Virginity Verifier-Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. September2005.
-
(2005)
-
-
Rutkowska, J.1
-
28
-
-
85084162914
-
-
Copilot-A Coprocessor-based Kernel Runtime Integrity Monitor. In Proceeding Usenix Security Symposium August.
-
Petroni NL, Fraser T, Molina J, Arbaugh WA.Copilot-A Coprocessor-based Kernel Runtime Integrity Monitor. In Proceeding Usenix Security Symposium August2004.
-
(2004)
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
29
-
-
84888423611
-
-
Windows rootkits of2005, Part 2.
-
Butler J, Sparks S.Windows rootkits of2005, Part 2.http://www.securityfocus.com/infocus/18512005.
-
(2005)
-
-
Butler, J.1
Sparks, S.2
|