<--- Back to Details
First PageDocument Content
Malware / Rootkits / System Management Mode / Ring / Hypervisor / Greg Hoglund / System software / Cyberwarfare / Computer security
Date: 2012-03-27 11:15:56
Malware
Rootkits
System Management Mode
Ring
Hypervisor
Greg Hoglund
System software
Cyberwarfare
Computer security

Learning from Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de A rootkit is malicious code with certain stealth ca

Add to Reading List

Source URL: stewin.org

Download Document from Source Website

File Size: 53,21 KB

Share Document on Facebook

Similar Documents

Advanced	
  x86:	
    BIOS	
  and	
  System	
  Management	
  Mode	
  Internals	
   SMM	
  Conclusion	
   Xeno	
  Kovah	
  &&	
  Corey	
  Kallenberg	
   LegbaCore,	
  LLC	
  

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   SMM  Conclusion   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

DocID: 1tQiw - View Document

2015 IEEE Symposium on Security and Privacy  Using Hardware Features for Increased Debugging Transparency Fengwei Zhang1 , Kevin Leach2 , Angelos Stavrou1 , Haining Wang3 , and Kun Sun1 1

2015 IEEE Symposium on Security and Privacy Using Hardware Features for Increased Debugging Transparency Fengwei Zhang1 , Kevin Leach2 , Angelos Stavrou1 , Haining Wang3 , and Kun Sun1 1

DocID: 1rcGO - View Document

Use of Sense-Making Methodology in a Requirement Process Georg Strom Gormsvej 1 DK-4320 Lejre, Denmark +

Use of Sense-Making Methodology in a Requirement Process Georg Strom Gormsvej 1 DK-4320 Lejre, Denmark +

DocID: 1qDCv - View Document

Microsoft PowerPoint - JulyCompatibility Mode]

Microsoft PowerPoint - JulyCompatibility Mode]

DocID: 1qgnz - View Document