Rootkit

Results: 605



#Item
181Computer security / Malware / Rootkit / Microsoft Security Essentials / Computer virus / Keystroke logging / Antivirus software / System software / Cyberwarfare

Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis Heng Yin∗† Dawn Song‡∗ Manuel Egele, Christopher Kruegel, Engin Kirda§ {pizzaman,chri

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
182Computer security / Malware / Rootkit / Smart / Transport / Technology / Electronics

Smart TV Security - #1984 st in 21

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 05:05:24
183System Management Mode / X86 architecture / Rootkit / Control register / Northbridge / X86-64 / Computer architecture / Computer hardware / Computing

Getting into the SMRAM: SMM Reloaded Loïc Duflot, Olivier Levillain, Benjamin Morin and Olivier Grumelard Central Directorate for Information Systems Security

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
184Booting / Computing / Boot loaders / Interrupts / Windows Vista startup process / INT 13H / Rootkit / Bootman / Master boot record / Computer architecture / BIOS / System software

CanSecWestNicolás A. Economou Andrés Lopez Luksenberg INTRO

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2012-03-09 16:34:24
185Patch / Microsoft Windows / Sdb / Rootkit / Internet Explorer / Windows Explorer / Diff / System software / Software / Computing

Persist It Using and Abusing Microsoft’s Fix It Patches Jon Erickson : iSIGHT Partners : Abstract: Microsoft has often used Fix it patches, which are a subset of Application Compatibility F

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:05:55
186Computer security / Data types / Control flow / Hooking / Malware / Rootkit / Keystroke logging / Computer virus / Subroutine / Computing / Software engineering / Computer programming

HookFinder: Identifying and Understanding Malware Hooking Behaviors Heng Yin†‡ Zhenkai Liang† Dawn Song§†

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
187Computer security / McAfee VirusScan / Malware / Rootkit / False alarm / Antivirus software / System software / Software

Anti-Virus Comparative - Appendix – Augustwww.av-comparatives.org Details about Discovered False Alarms

Add to Reading List

Source URL: www.av-comparatives.org

Language: English - Date: 2013-01-25 05:18:17
188Hypervisor / Hardware virtualization / Hyper-V / Microkernel / Rootkit / System software / Software / Virtual machines

Sierraware Overview Simply Secure Sierraware Software Suite 

Add to Reading List

Source URL: www.sierraware.com

Language: English - Date: 2013-02-27 20:09:46
189Computer security / Malware / Rootkit / Computer network security / Linux kernel / Avira / Spyware / Kernel / Avast! / System software / Software / Antivirus software

Anti-Virus Comparative Single Product Test Safe’N’Sec Enterprise Pro Date: January 2008

Add to Reading List

Source URL: www.av-comparatives.org

Language: English - Date: 2013-01-25 05:17:45
UPDATE