Rootkit

Results: 605



#Item
81Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin  Advanced Threat Research

Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2015-08-07 18:08:29
82Subverting the Xen hypervisor Rafal Wojtczuk  August 7, 2008 Abstract— This paper outlines the recent work by the author

Subverting the Xen hypervisor Rafal Wojtczuk August 7, 2008 Abstract— This paper outlines the recent work by the author

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:48
83WILL	
  ANDROID	
  TROJAN,	
  WORM	
  OR	
  ROOTKIT	
   SURVIVE	
  IN	
  SEANDROID	
  AND	
  CONTAINERIZATION?	
   Rowland	
  Yu	
  &	
  William	
  Lee	
   Email:	
  {rowland.yu,	
  william.lee}@sophos.

WILL  ANDROID  TROJAN,  WORM  OR  ROOTKIT   SURVIVE  IN  SEANDROID  AND  CONTAINERIZATION?   Rowland  Yu  &  William  Lee   Email:  {rowland.yu,  william.lee}@sophos.

Add to Reading List

Source URL: www.virusbtn.com

Language: English
    84Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

    Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

    Add to Reading List

    Source URL: www.kutter-fonds.ethz.ch

    Language: English - Date: 2010-05-16 10:46:32
    85Ksplice: Automatic Rebootless Kernel Updates Jeff Arnold and M. Frans Kaashoek Massachusetts Institute of Technology {jbarnold, kaashoek}@mit.edu  Abstract

    Ksplice: Automatic Rebootless Kernel Updates Jeff Arnold and M. Frans Kaashoek Massachusetts Institute of Technology {jbarnold, kaashoek}@mit.edu Abstract

    Add to Reading List

    Source URL: ksplice.oracle.com

    Language: English - Date: 2015-05-14 08:35:41
    86Vista system restore rootkit Principle and protection Edward Sun  PDF created with pdfFactory Pro trial version www.pdffactory.com

    Vista system restore rootkit Principle and protection Edward Sun PDF created with pdfFactory Pro trial version www.pdffactory.com

    Add to Reading List

    Source URL: www.hitcon.org

    Language: English - Date: 2008-08-03 13:04:35
      87Analisi di sistemi compromessi (ricerca di “rootkit”, backdoor, ...)  Massimo Bernaschi Istituto per le Applicazioni del Calcolo “Mauro Picone” Consiglio Nazionale delle Ricerche Viale del Policlinico,

      Analisi di sistemi compromessi (ricerca di “rootkit”, backdoor, ...) Massimo Bernaschi Istituto per le Applicazioni del Calcolo “Mauro Picone” Consiglio Nazionale delle Ricerche Viale del Policlinico,

      Add to Reading List

      Source URL: www.criticalcase.com

      Language: Italian
        88Technical Report of MRG Effitas and CrySyS Lab  An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

        Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

        Add to Reading List

        Source URL: blog.mrg-effitas.com

        Language: English - Date: 2014-12-03 11:48:39
        89Tommy Trojan’s Lament My name is Tommy Trojan, I’m only doin’ my job No-one ever told me, about this stinkin’ little NOD Even Ronnie Rootkit, he never said a word My life’s flashin’ by me, heuristics? How abs

        Tommy Trojan’s Lament My name is Tommy Trojan, I’m only doin’ my job No-one ever told me, about this stinkin’ little NOD Even Ronnie Rootkit, he never said a word My life’s flashin’ by me, heuristics? How abs

        Add to Reading List

        Source URL: www.eset.co.cr

        - Date: 2011-03-02 16:33:09