Rootkit

Results: 605



#Item
91Don’t Tell Joanna, The Virtualized Rootkit Is Dead Agenda ★

Don’t Tell Joanna, The Virtualized Rootkit Is Dead Agenda ★

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:45
    92Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

    Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2008-12-03 14:02:41
      93in conjunction with the 18th ACM Conference on Computer and Communications Security (CCS) October, SWISSÔTEL Chicago, Chicago, IL Mobile devices such as smartphones and Internet tablets have achieved computin

      in conjunction with the 18th ACM Conference on Computer and Communications Security (CCS) October, SWISSÔTEL Chicago, Chicago, IL Mobile devices such as smartphones and Internet tablets have achieved computin

      Add to Reading List

      Source URL: www.cs.ncsu.edu

      Language: English - Date: 2011-06-01 10:34:31
      94Log Analysis using OSSEC Daniel B. Cid  Copyright 2007 Daniel B. Cid

      Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

      Add to Reading List

      Source URL: ossec.net

      Language: English - Date: 2012-06-29 13:37:34
      95Chapter 10  Analysis of a Suspect Program: Linux Solutions in this chapter:

      Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

      Add to Reading List

      Source URL: scitechconnect.elsevier.com

      Language: English - Date: 2015-03-19 08:13:16
      96Paper Title (use style: paper title)

      Paper Title (use style: paper title)

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:23
      971  Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

      1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

      Add to Reading List

      Source URL: wwwx.cs.unc.edu

      Language: English - Date: 2014-09-05 15:38:44
      98CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

      CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

      Add to Reading List

      Source URL: cdn2.hubspot.net

      Language: English - Date: 2015-05-05 12:00:46
      99Introduction  Current personal firewalls are focused on combating usermode malware What about protection against rootkits?

      Introduction Current personal firewalls are focused on combating usermode malware What about protection against rootkits?

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:42
      100Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow  Fabian Monrose

      Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

      Add to Reading List

      Source URL: wwwx.cs.unc.edu

      Language: English - Date: 2014-09-05 15:38:44