The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Results: 11



#Item
1Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail  All materials is licensed under a Creative

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:23
2Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , ,   Abstract-- Techn

Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2004-08-12 13:59:29
3“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
4R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
5[Black Hat DCAn Uninvited Guest  Black Hat DC 2010 Conference Proceedings  An Uninvited Guest (Who Won’t Go Home)

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
6Microsoft Word - ARES[removed]FINALisimo corregido & new graphics Pablo.doc

Microsoft Word - ARES[removed]FINALisimo corregido & new graphics Pablo.doc

Add to Reading List

Source URL: www.pablobravo.com

Language: English
7Rootkits Survey A concealment story Pablo Bravo, Daniel F. García Department of Informatics University of Oviedo

Rootkits Survey A concealment story Pablo Bravo, Daniel F. García Department of Informatics University of Oviedo

Add to Reading List

Source URL: www.pablobravo.com

Language: English
8The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

Add to Reading List

Source URL: www.belowgotham.com

Language: English - Date: 2009-04-09 11:20:03
9:: The Root of All Evil? - Rootkits Revealed Are rootkits the root of all evil, or just another branch on the threat tree? What you need to know about the rootkit threat.

:: The Root of All Evil? - Rootkits Revealed Are rootkits the root of all evil, or just another branch on the threat tree? What you need to know about the rootkit threat.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:08
10Microsoft PowerPoint - Sutton_Mario_Poster FinalDM.pptx [Read-Only]

Microsoft PowerPoint - Sutton_Mario_Poster FinalDM.pptx [Read-Only]

Add to Reading List

Source URL: computing.ornl.gov

Language: English - Date: 2012-08-08 11:37:00