Rootkit

Results: 605



#Item
521Computing / Computer security / Rootkit / Windows Registry / Subst / System software / Malware / Cyberwarfare

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 THE CURSE OF NECURS, PART 1 Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-05-01 13:37:19
522Software / Unified Extensible Firmware Interface / Rootkit / Windows 8 / Insyde Software / Personal computer hardware / SHA-2 / BIOS / System software / Computing

presented by UEFI Security Enhancements UEFI Fall Plugfest – October 24-27, 2011 Presented by Kevin Davis (Insyde Software) Updated[removed]

Add to Reading List

Source URL: feishare.com

Language: English - Date: 2012-02-22 02:04:43
523Relational database management systems / Cross-platform software / Oracle Database / Oracle Corporation / Oracle Rdb / Rootkit / SQL*Plus / Software / Proprietary software / Computing

Oracle RDBMS rootkits and other modifications Dennis Yurichev 6-Jan-2014 1

Add to Reading List

Source URL: yurichev.com

Language: English - Date: 2014-01-06 05:27:41
524DMA attack / IOMMU / Rootkit / Malware / Bus mastering / DMA / Parallel ATA / Southbridge / 64-bit / Computer hardware / Motherboard / Direct memory access

Understanding DMA Malware Patrick Stewin¶ and Iurii Bystrov§ Security in Telecommunications — Technische Universit¨ at Berlin Ernst-Reuter-Platz 7, 10587 Berlin, Germany ¶

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-07-30 11:38:40
525Computer security / Malware / Rootkit / System Management Mode / Keystroke logging / Ring / Hypervisor / USB flash drive / Computer keyboard / System software / Computing / Computer hardware

Berlin Institute of Technology FG Security in Telecommunications © Weiss Evaluating “Ring -3” Rootkits

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:55
526Computer security / Malware / Rootkit / Keystroke logging / System Management Mode / USB flash drive / Universal Serial Bus / Computer keyboard / Parallel ATA / Computer hardware / System software / Computing

Berlin Institute of Technology FG Security in Telecommunications “In God We Trust All Others We Monitor“ Patrick Stewin and Jean-Pierre Seifert

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:53
527Malware / Rootkit / System Management Mode / Virtual machines / Ring / Hypervisor / Cisco IOS / Kernel / Hyper-V / System software / Software / Computer security

Berlin Institute of Technology FG Security in Telecommunications © Weiss “Learning from Rootkits”

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:55
528Computer security / Malware / Rootkit / Intel Active Management Technology / Direct memory access / Ring / Intel / Keystroke logging / Computer hardware / Computing / Cyberwarfare

Evaluating “Ring -3” Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de In 2009, security researchers discovered

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:56
529Malware / Rootkits / System Management Mode / Ring / Hypervisor / Greg Hoglund / System software / Cyberwarfare / Computer security

Learning from Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de A rootkit is malicious code with certain stealth ca

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:56
530Rootkit / Snapshot / Cyberwarfare / Computer security / Persistence / Computing / Malware

AFR: Automatic Multi-Stage Forensic Data Retrieval David Gugelmann Dominik Schatzmann Vincent Lenders

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2013-01-16 05:54:50
UPDATE