Rootkit

Results: 605



#Item
121Malware / Computer network security / Multi-agent systems / Spamming / Botnets / Computer virus / Antivirus software / Zeus / Rootkit / Computing / System software / Cyberwarfare

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 11:57:01
122Rootkits / Malware / Chkrootkit / Hacker / Computer virus / Loadable kernel module / Kernel / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / System software / Computer security / Cyberwarfare

Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2004-08-12 13:59:29
123Virtual machines / Programming language implementation / Hyper-V / Kernel / Hypervisor / Ring / Rootkit / Xen / Memory management unit / System software / Software / Central processing unit

HIMA: A Hypervisor-Based Integrity Measurement Agent Ahmed M. Azab, Peng Ning, Emre C. Sezer North Carolina State University {amazab, pning, ecsezer}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
124Computer network security / Risk / National security / Vulnerability / Stuxnet / Social vulnerability / Zero-day attack / Security risk / Rootkit / Cyberwarfare / Security / Computer security

Microsoft PowerPoint - critis_2013_0918_advanced_risks

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 17:44:50
125Computer security / Ransomware / Targeted threat / Zero-day attack / Rootkit / Crimeware / Trojan horse / Web threat / Linux malware / Malware / System software / Cyberwarfare

ReportThreats Predictions By McAfee Labs

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:32
126Trusted Computing Group / Trusted Platform Module / Cryptography / Rootkit / Computer security / Cyberwarfare / Trusted computing

The Diversity of TPMs and its Effects on Development A Case Study of Integrating the TPM into OpenSolaris ∗ Anna Shubina

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-09 19:13:24
127Computing / Unified Extensible Firmware Interface / Advanced Configuration and Power Interface / Rootkit / System Management Mode / Firmware / PCI configuration space / Option ROM / Booting / BIOS / System software / Computer hardware

Acquisition and Analysis of Compromised Firmware Using Memory Forensics Johannes Stüttgen, Stefan Voemel and Michael Denzel

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-31 11:50:18
128Hypervisor / Paravirtualization / Rootkit / Hyper-V / X86 virtualization / Xen / VirtualBox / VM / Virtualization / System software / Software / Virtual machines

VM-based Security Overkill: A Lament for Applied Systems Security Research Sergey Bratus Michael E. Locasto

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 18:05:24
129Linux kernel / Cross-platform software / Ksplice / Rootkit / Kernel / Loadable kernel module / Patch / Operating system / Architecture of Windows NT / Software / Computing / System software

Ksplice: Automatic Rebootless Kernel Updates Jeff Arnold and M. Frans Kaashoek Massachusetts Institute of Technology {jbarnold, kaashoek}@mit.edu Abstract

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
130Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software

“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE