-
1
-
-
84906484467
-
-
McAfee: Rootkits, Part 1 of 3: A Growing Threat. white paper (April 2006)
-
McAfee: Rootkits, Part 1 of 3: A Growing Threat. white paper (April 2006)
-
-
-
-
2
-
-
84906484468
-
-
McAfee: 2010 Threat Predictions. white paper, McAfee AVERT Labs (December 2009)
-
McAfee: 2010 Threat Predictions. white paper, McAfee AVERT Labs (December 2009)
-
-
-
-
3
-
-
79960552201
-
Detecting kernel-level rootkits using data structure invariants
-
Baliga, A., Ganapathy, V., Iftode, L.: Detecting kernel-level rootkits using data structure invariants. IEEE Transactions on Dependable and Secure Computing 8(5), 670-684 (2011)
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 670-684
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
4
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Petroni Jr., N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In: Proceedings of the 15th USENIX Security Symposium, pp. 289-304 (2006)
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 289-304
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
6
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering kernel rootkits with lightweight hook protection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 545-554. ACM (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
7
-
-
21644451617
-
Detecting kernel-level rootkits through binary analysis
-
IEEE
-
Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: 20th Annual Computer Security Applications Conference 2004, pp. 91-100. IEEE (2004)
-
(2004)
20th Annual Computer Security Applications Conference 2004
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
8
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
ACM
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 335-350. ACM (2007)
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
9
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
RAID 2008. LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
10
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE
-
Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An architecture for secure active monitoring using virtualization. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 233-247. IEEE (2008)
-
(2008)
IEEE Symposium on Security and Privacy, SP 2008
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
11
-
-
77950853188
-
Stealthy malware detection through vmm-based outof-The-box semantic view reconstruction
-
ACM
-
Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based outof-the-box semantic view reconstruction. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 128-138. ACM (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
12
-
-
60649112256
-
Vici-virtual machine introspection for cognitive immunity
-
IEEE
-
Fraser, T., Evenson, M.R., Arbaugh, W.A.: Vici-virtual machine introspection for cognitive immunity. In: Annual Computer Security Applications Conference, ACSAC 2008, pp. 87-96. IEEE (2008)
-
(2008)
Annual Computer Security Applications Conference, ACSAC 2008
, pp. 87-96
-
-
Fraser, T.1
Evenson, M.R.2
Arbaugh, W.A.3
-
14
-
-
84906493820
-
-
Linux-KVM: Linux-KVM
-
Linux-KVM: Linux-KVM, http://www.linux-kvm.org/page/Main-Page
-
-
-
-
15
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
Litty, L., Lagar-Cavilla, H.A., Lie, D.: Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th Conference on Security Symposium, pp. 243-258 (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
17
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data
-
IEEE
-
Baliga, A., Kamat, P., Iftode, L.: Lurking in the shadows: Identifying systemic threats to kernel data. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 246-251. IEEE (2007)
-
(2007)
IEEE Symposium on Security and Privacy, SP 2007
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
18
-
-
84906512693
-
-
Stealth: Announcing full functional adore-ng rootkit for 2.6 kernel
-
Stealth: Announcing full functional adore-ng rootkit for 2.6 kernel, http://lwn.net/Articles/75991/
-
-
-
-
19
-
-
84906493818
-
-
eNYe Sec: eNYeLKM v1.1
-
eNYe Sec: eNYeLKM v1.1, http://www.enye-sec.org/en/tags/enye-lkm/
-
-
-
-
20
-
-
84906503232
-
-
Halflife: Abuse of the Linux-kernel for Fun and Profit. Phrack Magazine 5(50) (April 1997)
-
Halflife: Abuse of the Linux-kernel for Fun and Profit. Phrack Magazine 5(50) (April 1997)
-
-
-
-
22
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Hund, R., Holz, T., Freiling, F.C.: Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In: Proceedings of the 18th USENIX Security Symposium, pp. 383-398 (2009)
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
|