Rootkit

Results: 605



#Item
71Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0

Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0

Add to Reading List

Source URL: blog.invisiblethings.org

Language: English - Date: 2016-03-16 08:27:13
72Implementing and Detecting a PCI Rootkit John Heasman [] Black Hat DC 2007 An NGSSoftware Insight Security Research (NISR) Publication ©2006 Next Generation Security Software Ltd

Implementing and Detecting a PCI Rootkit John Heasman [] Black Hat DC 2007 An NGSSoftware Insight Security Research (NISR) Publication ©2006 Next Generation Security Software Ltd

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:25
    73ADVANCED MAC OS X ROOTKITS DINO A. DAI ZOVI  Abstract. The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known,

    ADVANCED MAC OS X ROOTKITS DINO A. DAI ZOVI Abstract. The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known,

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English
    74Advanced Threat Research  Technical Details of the S3 Resume Boot Script Vulnerability Revision 1 July 2015

    Advanced Threat Research Technical Details of the S3 Resume Boot Script Vulnerability Revision 1 July 2015

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2015-07-29 16:06:16
    75IBM Presentation Template  Full Version

    IBM Presentation Template Full Version

    Add to Reading List

    Source URL: digitalpiglet.org

    Language: English - Date: 2009-11-27 08:31:33
    76Cites & Insights: Crawford at Large

    Cites & Insights: Crawford at Large

    Add to Reading List

    Source URL: www.citesandinsights.info

    Language: English - Date: 2006-07-15 15:59:31
    77A 16 bit Rootkit and Second Generation Zigbee Chips at Black Hat USA 2009

    A 16 bit Rootkit and Second Generation Zigbee Chips at Black Hat USA 2009

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:49
      78IsGameOver() Anyone? Joanna Rutkowska Alexander Tereshkin  Invisible Things Lab

      IsGameOver() Anyone? Joanna Rutkowska Alexander Tereshkin Invisible Things Lab

      Add to Reading List

      Source URL: invisiblethingslab.com

      Language: English - Date: 2009-01-04 16:42:44
      79Insider Threats  Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

      Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35
      80Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

      Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35