Rootkit

Results: 605



#Item
111Virtual memory / Windows Server / Windows NT / Memory management / Rootkit / Windows / Virtual address space / Page / Architecture of Windows NT / Computer architecture / Microsoft Windows / System software

digital investigation 4SS62–S64 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-08-08 22:11:55
112Virtual machines / X86 architecture / Operating system / Kernel / Ghost / Virtual memory / Hyper-V / Rootkit / IOMMU / System software / Software / Computing

Virtual Ghost: Protecting Applications from Hostile Operating Systems John Criswell Nathan Dautenhahn

Add to Reading List

Source URL: sva.cs.illinois.edu

Language: English - Date: 2014-01-16 14:57:03
113Linux kernel / Monolithic kernels / Kernel / Grsecurity / Rootkit / Ring / PaX / Loadable kernel module / Mandatory access control / System software / Software / Computer architecture

Intrusion detection for resource-constrained embedded control systems in the power grid

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
114Computer security / Android / Malware / Embedded Linux / Rootkit / Rooting / Ptrace / Privilege escalation / Linux Security Modules / Computing / Smartphones / Software

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
115Hacking / Malware / Rootkit / Nessus / Vulnerability / SAINT / Nmap / Port scanner / COPS / Software / System software / Computer security

Security Vulnerabilities and Precautions Andrew Sansum 29 September 1998 How They Get In

Add to Reading List

Source URL: hepwww.rl.ac.uk

Language: English - Date: 2007-05-14 10:18:37
116Android devices / Free software / Android / Embedded Linux / Hardware restrictions / Rooting / Privilege escalation / Rootkit / Motorola Droid / Smartphones / Software / Computing

Fourteenforty Research Institute, Inc. Black Hat Abu Dhabi 2011 Yet Another Android Rootkit

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
117Software / Rootkit / Advanced Configuration and Power Interface / Unified Extensible Firmware Interface / Memory map / QEMU / Operating system / Booting / Computer memory / System software / BIOS / Computing

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:35:49
118Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
119Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
120Linux kernel / Monolithic kernels / Computer security / Malware / Rootkit / Kernel / Loadable kernel module / Hooking / Ring / System software / Software / Computer architecture

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
UPDATE