Rootkit

Results: 605



#Item
111digital investigation 4SS62–S64  available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

digital investigation 4SS62–S64 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-08-08 22:11:55
112Virtual Ghost: Protecting Applications from Hostile Operating Systems John Criswell Nathan Dautenhahn

Virtual Ghost: Protecting Applications from Hostile Operating Systems John Criswell Nathan Dautenhahn

Add to Reading List

Source URL: sva.cs.illinois.edu

Language: English - Date: 2014-01-16 14:57:03
113Intrusion detection for resource-constrained embedded control systems in the power grid

Intrusion detection for resource-constrained embedded control systems in the power grid

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
114Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
115Security Vulnerabilities and Precautions Andrew Sansum 29 September 1998  How They Get In

Security Vulnerabilities and Precautions Andrew Sansum 29 September 1998 How They Get In

Add to Reading List

Source URL: hepwww.rl.ac.uk

Language: English - Date: 2007-05-14 10:18:37
116Fourteenforty Research Institute, Inc.  Black Hat Abu Dhabi 2011 Yet Another Android Rootkit

Fourteenforty Research Institute, Inc. Black Hat Abu Dhabi 2011 Yet Another Android Rootkit

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
117doi:j.diin

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:35:49
118TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
119Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
120Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03