Rootkit

Results: 605



#Item
101

NEW CRIMINAL POTENTIAL– ANDROID ROOTKIT Alexandru Negrila 1 Abstract Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the

Add to Reading List

Source URL: plagiarism.repec.org

- Date: 2011-12-14 03:13:49
    102Malware / Digital video recorders / Computer security / Rootkit / Keystroke logging / National Security Agency / TiVo / Smart grid / Security / Espionage / Cyberwarfare

    Security Now! #Q&A #212  This week on Security Now! ● ●

    Add to Reading List

    Source URL: www.grc.com

    Language: English - Date: 2015-05-12 13:10:51
    103Computer security / Computer worms / Antivirus software / Conficker / ESET / AutoRun / Computer virus / David Harley / Rootkit / Malware / System software / Software

    June 2012 Feature article: ACAD/Medre: 10ks of AutoCAD Designs Leaked in Suspected Industrial Espionage Table of Contents

    Add to Reading List

    Source URL: www.virus-radar.com

    Language: English - Date: 2013-04-08 09:20:46
    104Software / Social engineering / BitDefender / Trojan horse / Conficker / Rootkit / Rogue security software / Phishing / BitDefender safego / Malware / Antivirus software / System software

    E-Threats Landscape Report Disclaimer The information and data asserted in this document represent the current ® opinon of BitDefender on the topics addressed as of the date of publication.

    Add to Reading List

    Source URL: www.bitdefender.com

    Language: English - Date: 2011-08-05 07:48:57
    105Computing / Malware / Rootkit / Host Based Security System / Computer virus / Computer security / Antivirus software / Cyberwarfare

    Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigation

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2015-01-16 11:37:31
    106Malware / Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Rootkit / Computer virus / Computer worm / Botnet / Antivirus software / System software / Computer security

    Malware Trend Report, Q1 2014 January | February | March 22 April 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

    Add to Reading List

    Source URL: www.redsocks.nl

    Language: English - Date: 2015-06-17 02:25:38
    107Computer network security / Malware / Firmware / Rootkit / Binary blob / Denial-of-service attack / Vulnerability / DD-WRT / Threat / Cyberwarfare / Computer security / Computing

    When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US

    Add to Reading List

    Source URL: www.redballoonsecurity.com

    Language: English - Date: 2014-02-27 21:40:02
    108Virtual machines / Programming language implementation / Rootkit / Malware / Windows Virtual PC / Hypervisor / VirtualBox / Ring / Operating system / System software / Software / VMware

    SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2006-03-03 22:37:06
    109Shellcode / Cisco IOS / Rootkit / Denial-of-service attack / Router / Cisco Systems / IOS / Transmission Control Protocol / Hacking: The Art of Exploitation Second Edition / Computing / Cyberwarfare / Computer security

    Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

    Add to Reading List

    Source URL: www.redballoonsecurity.com

    Language: English - Date: 2014-02-27 21:40:34
    110Computer network security / Malware / Software quality / Application software / Vulnerability / Threat / Rootkit / Microsoft Security Essentials / Software / Cyberwarfare / Computer security / Computing

    Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2014-10-09 10:35:01
    UPDATE