Rootkit

Results: 605



#Item
81Software / System software / Computing / Hypervisor / Hyper-V / Virtual machine / Virtualization / VM / Rootkit / Protection ring / Hardware virtualization / Embedded hypervisor

Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2015-08-07 18:08:29
82Linux Foundation / University of Cambridge Computer Laboratory / Xen / NetBSD / X86 architecture / Hypervisor / Paravirtualization / Protection ring / Hardware virtualization / Hyper-V / Rootkit / Microkernel

Subverting the Xen hypervisor Rafal Wojtczuk August 7, 2008 Abstract— This paper outlines the recent work by the author

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:48
83

WILL  ANDROID  TROJAN,  WORM  OR  ROOTKIT   SURVIVE  IN  SEANDROID  AND  CONTAINERIZATION?   Rowland  Yu  &  William  Lee   Email:  {rowland.yu,  william.lee}@sophos.

Add to Reading List

Source URL: www.virusbtn.com

Language: English
    84Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

    Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

    Add to Reading List

    Source URL: www.kutter-fonds.ethz.ch

    Language: English - Date: 2010-05-16 10:46:32
    85Ksplice / Linux kernel / Kernel patch / Kernel / Rootkit / Patch / Loadable kernel module / Entry point / Operating system / Architecture of Windows NT / Dynamic software updating / KGraft

    Ksplice: Automatic Rebootless Kernel Updates Jeff Arnold and M. Frans Kaashoek Massachusetts Institute of Technology {jbarnold, kaashoek}@mit.edu Abstract

    Add to Reading List

    Source URL: ksplice.oracle.com

    Language: English - Date: 2015-05-14 08:35:41
    86

    Vista system restore rootkit Principle and protection Edward Sun PDF created with pdfFactory Pro trial version www.pdffactory.com

    Add to Reading List

    Source URL: www.hitcon.org

    Language: English - Date: 2008-08-03 13:04:35
      87

      Analisi di sistemi compromessi (ricerca di “rootkit”, backdoor, ...) Massimo Bernaschi Istituto per le Applicazioni del Calcolo “Mauro Picone” Consiglio Nazionale delle Ricerche Viale del Policlinico,

      Add to Reading List

      Source URL: www.criticalcase.com

      Language: Italian
        88Computer security / Cyberwarfare / Computing / Computer network security / Antivirus software / Malware / Lastline / Intrusion detection system / Advanced persistent threat / Rootkit / Duqu / Computer virus

        Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

        Add to Reading List

        Source URL: blog.mrg-effitas.com

        Language: English - Date: 2014-12-03 11:48:39
        89

        Tommy Trojan’s Lament My name is Tommy Trojan, I’m only doin’ my job No-one ever told me, about this stinkin’ little NOD Even Ronnie Rootkit, he never said a word My life’s flashin’ by me, heuristics? How abs

        Add to Reading List

        Source URL: www.eset.co.cr

        - Date: 2011-03-02 16:33:09
          UPDATE