Rootkit

Results: 605



#Item
521VIRUS BULLETIN www.virusbtn.com  MALWARE ANALYSIS 1 THE CURSE OF NECURS, PART 1 Peter Ferrie Microsoft, USA

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 THE CURSE OF NECURS, PART 1 Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-05-01 13:37:19
522presented by  UEFI Security Enhancements UEFI Fall Plugfest – October 24-27, 2011 Presented by Kevin Davis (Insyde Software) Updated[removed]

presented by UEFI Security Enhancements UEFI Fall Plugfest – October 24-27, 2011 Presented by Kevin Davis (Insyde Software) Updated[removed]

Add to Reading List

Source URL: feishare.com

Language: English - Date: 2012-02-22 02:04:43
523Oracle RDBMS rootkits and other modifications Dennis Yurichev <dennis@yurichev.com> 6-Jan-2014 1

Oracle RDBMS rootkits and other modifications Dennis Yurichev 6-Jan-2014 1

Add to Reading List

Source URL: yurichev.com

Language: English - Date: 2014-01-06 05:27:41
524Understanding DMA Malware Patrick Stewin¶ and Iurii Bystrov§ Security in Telecommunications — Technische Universit¨ at Berlin Ernst-Reuter-Platz 7, 10587 Berlin, Germany ¶

Understanding DMA Malware Patrick Stewin¶ and Iurii Bystrov§ Security in Telecommunications — Technische Universit¨ at Berlin Ernst-Reuter-Platz 7, 10587 Berlin, Germany ¶

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-07-30 11:38:40
525Berlin Institute of Technology FG Security in Telecommunications © Weiss  Evaluating “Ring -3” Rootkits

Berlin Institute of Technology FG Security in Telecommunications © Weiss Evaluating “Ring -3” Rootkits

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:55
526Berlin Institute of Technology FG Security in Telecommunications “In God We Trust All Others We Monitor“ Patrick Stewin and Jean-Pierre Seifert

Berlin Institute of Technology FG Security in Telecommunications “In God We Trust All Others We Monitor“ Patrick Stewin and Jean-Pierre Seifert

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:53
527Berlin Institute of Technology FG Security in Telecommunications © Weiss  “Learning from Rootkits”

Berlin Institute of Technology FG Security in Telecommunications © Weiss “Learning from Rootkits”

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:55
528Evaluating “Ring -3” Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de In 2009, security researchers discovered

Evaluating “Ring -3” Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de In 2009, security researchers discovered

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:56
529Learning from Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de A rootkit is malicious code with certain stealth ca

Learning from Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de A rootkit is malicious code with certain stealth ca

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:56
530AFR: Automatic Multi-Stage Forensic Data Retrieval David Gugelmann Dominik Schatzmann  Vincent Lenders

AFR: Automatic Multi-Stage Forensic Data Retrieval David Gugelmann Dominik Schatzmann Vincent Lenders

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2013-01-16 05:54:50