![Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software](https://www.pdfsearch.io/img/974d6a20ba1034ad6f06680d0f35d870.jpg)
| Document Date: 2014-12-16 19:06:36 Open Document File Size: 415,72 KBShare Result on Facebook
Company IDT / HBGary Inc. / Enterasys Networks Inc. / Offensive Rootkit Technologies / / Facility University of Central Florida / / IndustryTerm subversive technologies / digital forensic applications / defensive malicious code technologies / parental control software / / OperatingSystem UNIX / Integrity / Microsoft Windows / / Organization University of Central Florida / / Person Jamie Butler / Greg Hoglund / Joanna Rutkowska Detecting Hooks / Sherri Sparks / Sherri Sparks Jamie Butler / Jamie Butler Detecting / / Position senior developer / Object Manager / author / rootkit driver / driver / Director of Engineering / Thread Manager / computer scientist / Configuration Manager / computer scientist at the NSA / O Manager / co-author / / ProvinceOrState Mississippi / / PublishedMedium the IEEE IA Workshop proceedings / Phrack / / Region Central Florida / / Technology defensive malicious code technologies / AV / UNIX / API / operating system / /
SocialTag |