Rootkit

Results: 605



#Item
101NEW CRIMINAL POTENTIAL– ANDROID ROOTKIT Alexandru Negrila 1 Abstract Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the

NEW CRIMINAL POTENTIAL– ANDROID ROOTKIT Alexandru Negrila 1 Abstract Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the

Add to Reading List

Source URL: plagiarism.repec.org

- Date: 2011-12-14 03:13:49
    102Security Now! #Q&A #212  This week on Security Now! ● ●

    Security Now! #Q&A #212  This week on Security Now! ● ●

    Add to Reading List

    Source URL: www.grc.com

    Language: English - Date: 2015-05-12 13:10:51
    103June 2012 Feature article: ACAD/Medre: 10ks of AutoCAD Designs Leaked in Suspected Industrial Espionage  Table of Contents

    June 2012 Feature article: ACAD/Medre: 10ks of AutoCAD Designs Leaked in Suspected Industrial Espionage Table of Contents

    Add to Reading List

    Source URL: www.virus-radar.com

    Language: English - Date: 2013-04-08 09:20:46
    104E-Threats Landscape Report  Disclaimer The information and data asserted in this document represent the current ® opinon of BitDefender on the topics addressed as of the date of publication.

    E-Threats Landscape Report Disclaimer The information and data asserted in this document represent the current ® opinon of BitDefender on the topics addressed as of the date of publication.

    Add to Reading List

    Source URL: www.bitdefender.com

    Language: English - Date: 2011-08-05 07:48:57
    105Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigation

    Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigation

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2015-01-16 11:37:31
    106Malware Trend Report, Q1 2014 January | February | March 22 April 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

    Malware Trend Report, Q1 2014 January | February | March 22 April 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

    Add to Reading List

    Source URL: www.redsocks.nl

    Language: English - Date: 2015-06-17 02:25:38
    107When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US

    When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US

    Add to Reading List

    Source URL: www.redballoonsecurity.com

    Language: English - Date: 2014-02-27 21:40:02
    108SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research

    SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2006-03-03 22:37:06
    109Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

    Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

    Add to Reading List

    Source URL: www.redballoonsecurity.com

    Language: English - Date: 2014-02-27 21:40:34
    110Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014

    Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2014-10-09 10:35:01