<--- Back to Details
First PageDocument Content
Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control
Date: 2017-05-14 06:12:20
Computer architecture
System software
Operating system kernels
Linux kernel
Monolithic kernels
Kernel
Loadable kernel module
Protection ring
Operating system
Mach
Rootkit
Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 151,46 KB

Share Document on Facebook

Similar Documents

Master Boot Record rootkit defenses

Master Boot Record rootkit defenses

DocID: 1v6tD - View Document

Rootkit analysis Use case on HideDRV VersionAuthor:

Rootkit analysis Use case on HideDRV VersionAuthor:

DocID: 1uZBR - View Document

“SHADOW WALKER” Raising The Bar For Rootkit Detection By Sherri Sparks

“SHADOW WALKER” Raising The Bar For Rootkit Detection By Sherri Sparks

DocID: 1u3Jz - View Document

Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

DocID: 1s1IQ - View Document

Risks and Challenges of Live Virtual Machine Migration Presenter: Jon Oberheide University of Michigan

Risks and Challenges of Live Virtual Machine Migration Presenter: Jon Oberheide University of Michigan

DocID: 1rsZZ - View Document