Rootkit

Results: 605



#Item
91

Don’t Tell Joanna, The Virtualized Rootkit Is Dead Agenda ★

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:45
    92

    Introduction Rootkit for Firefox Rootkit for Internet Explorer Browser Rootkits Christophe Devaux -

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2008-12-03 14:02:41
      93System software / Android / Consumerization / Cloud computing / IOS / Sandbox / Rooting / Mobile application development / Rootkit / Computing / Smartphones / Software

      in conjunction with the 18th ACM Conference on Computer and Communications Security (CCS) October, SWISSÔTEL Chicago, Chicago, IL Mobile devices such as smartphones and Internet tablets have achieved computin

      Add to Reading List

      Source URL: www.cs.ncsu.edu

      Language: English - Date: 2011-06-01 10:34:31
      94Computer network security / Intrusion detection systems / OSSEC / Computer security / Daniel B. Cid / Rootkit / Snort / Log analysis / Security log / System software / Software / Computing

      Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

      Add to Reading List

      Source URL: ossec.net

      Language: English - Date: 2012-06-29 13:37:34
      95Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing

      Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

      Add to Reading List

      Source URL: scitechconnect.elsevier.com

      Language: English - Date: 2015-03-19 08:13:16
      96Malware / Computer network security / Security / Rootkit / Computer virus / Analysis / Threat / Computer security / Cyberwarfare / Antivirus software

      Paper Title (use style: paper title)

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:23
      97Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

      1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

      Add to Reading List

      Source URL: wwwx.cs.unc.edu

      Language: English - Date: 2014-09-05 15:38:44
      98Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

      CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

      Add to Reading List

      Source URL: cdn2.hubspot.net

      Language: English - Date: 2015-05-05 12:00:46
      99Computing / Data security / Firewall / Rootkit / Personal firewall / Distributed firewall / Application firewall / Computer network security / Cyberwarfare / Computer security

      Introduction Current personal firewalls are focused on combating usermode malware What about protection against rootkits?

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:42
      100Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines

      Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

      Add to Reading List

      Source URL: wwwx.cs.unc.edu

      Language: English - Date: 2014-09-05 15:38:44
      UPDATE