Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
168 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
128 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
116 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
111 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
99 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
99 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
94 | Sébastien Josse |
Rootkit detection from outside the Matrix. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
64 | Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson |
Timely Rootkit Detection During Live Response. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
live response, Rootkit detection |
59 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
57 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
52 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Automatic Inference and Enforcement of Kernel Data Structure Invariants. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Woei-Jiunn Tsaur, Yuh-Chen Chen |
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit. |
SocialCom/PASSAT |
2010 |
DBLP DOI BibTeX RDF |
|
47 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards a tamper-resistant kernel rootkit detector. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, kernel rootkit, intrusion detection, Linux |
42 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
40 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
40 | Matt Bishop, Deborah A. Frincke |
Who Owns Your Computer? |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Sony, BMG, First4Internet, education, digital rights management, DRM, rootkit |
40 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
rootkits, rootkit, Invasive software |
40 | Edward W. Felten, J. Alex Halderman |
Digital Rights Management, Spyware, and Security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP |
40 | Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
dynamic root of trust, self-check-summing code, software-based code attestation, verifiable code execution, rootkit detection |
35 | Zhiqiang Lin, Ryan D. Riley, Dongyan Xu |
Polymorphing Software by Randomizing Data Structure Layout. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Timothy Fraser, Matthew R. Evenson, William A. Arbaugh |
VICI Virtual Machine Introspection for Cognitive Immunity. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
24 | Xingyu hu, Ming Huang, Youhua Xue, Lifeng Jiang, Yao Liu, Guoqi Xie |
Drootkit: Kernel-Level Rootkit Detection and Recovery Based on eBPF. |
J. Circuits Syst. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Suresh Kumar S, Sudalai Muthu T |
Volatile Kernel Rootkit hidden process detection in cloud computing. |
J. Cloud Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Andres Intriago, Shamik Sengupta, Charalambos Konstantinou |
Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Nadim, Wonjun Lee, David Akopian |
Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, Vassilis C. Nikolaidis, Charalambos Konstantinou |
Behind Closed Doors: Process-Level Rootkit Attacks in Cyber-Physical Microgrid Systems. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
24 | Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ |
Phase space power analysis for PC-based rootkit detection. |
ACM Southeast Regional Conference |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Michal Szaknis, Krzysztof Szczypiorski |
The design of the simple SMM rootkit. |
icWCSN |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Duy-Phuc Pham, Damien Marion 0001, Annelie Heuser |
ULTRA: Ultimate Rootkit Detection over the Air. |
RAID |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Duy-Phuc Pham |
Leveraging side-channel signals for IoT malware classification and rootkit detection. (Analyse de malware en utilisant des techniques d'attaques par canaux auxiliaires). |
|
2022 |
RDF |
|
24 | Roland Nagy, Krisztián Németh, Dorottya Papp, Levente Buttyán |
Rootkit Detection on Embedded IoT Devices. |
Acta Cybern. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | R. Geetha Ramani, S. Suresh Kumar |
Nonvolatile kernel rootkit detection using cross-view clean boot in cloud computing. |
Concurr. Comput. Pract. Exp. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Yong-Gang Li, Yeh-Ching Chung, Kai Hwang 0001, Yue-Jin Li |
Virtual Wall: Filtering Rootkit Attacks To Protect Linux Kernel Functions. |
IEEE Trans. Computers |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Joseph Connelly, Taylor Roberts, Xing Gao 0001, Jidong Xiao, Haining Wang, Angelos Stavrou |
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. |
DSN |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Nadim, Wonjun Lee, David Akopian |
Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training. |
MOBMU |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Suman Rath, Ioannis Zografopoulos, Charalambos Konstantinou |
Stealthy Rootkit Attacks on Cyber-Physical Microgrids: Poster. |
e-Energy |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Stylianos Karagiannis, Alexandros Tokatlis, Sotiris Pelekis, Michael Kontoulis, George Doukas, Christos Ntanos, Emmanouil Magkos |
A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study. |
PCI |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Guangyuan Hu, Tianwei Zhang 0004, Ruby B. Lee |
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. |
HASP@MICRO |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay 0001 |
Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring. |
ACM Great Lakes Symposium on VLSI |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Donghai Tian, Rui Ma 0004, Xiaoqi Jia, Changzhen Hu |
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ohmin Kwon 0001, Hyun Kwon, Hyunsoo Yoon |
Rootkit inside GPU Kernel Execution. |
IEICE Trans. Inf. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Liwei Zhou, Yiorgos Makris |
Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution. |
DATE |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Chaoyuan Cui, Yun Wu, Yonggang Li, Bingyu Sun |
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. |
KSII Trans. Internet Inf. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hyungon Moon, Hojoon Lee 0001, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang |
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. |
IEEE Trans. Dependable Secur. Comput. |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Luis Garcia 0001, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz |
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. |
NDSS |
2017 |
DBLP BibTeX RDF |
|
24 | Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively |
Rootkit detection through phase-space analysis of power voltage measurements. |
MALWARE |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Zhiqiang Zhu, Zhiyuan Zhao, Lei Sun, Jie Yang |
虚拟化环境下基于职能分离的Rootkit检测系统架构研究 (Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment). |
计算机科学 |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Chen Chen 0057, Darius Suciu, Radu Sion |
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
24 | WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim |
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. |
USENIX Security Symposium |
2016 |
DBLP BibTeX RDF |
|
24 | Andrew Case, Golden G. Richard III |
Advancing Mac OS X rootkit detection. |
Digit. Investig. |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh |
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. |
J. Inf. Sci. Eng. |
2015 |
DBLP BibTeX RDF |
|
24 | K. Muthumanickam, E. Ilavarasan |
Optimization of rootkit revealing system resources - A game theoretic approach. |
J. King Saud Univ. Comput. Inf. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Igor Korkin, Ivan Nesterov |
Applying Memory Forensics to Rootkit Detection. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
24 | Zhiyuan Zhao, Zhiqiang Zhu, Lei Sun, Kexin Ma |
虚拟化环境中基于神经网络专家系统的Rootkit检测方法研究 (Research on Rootkit Detection Method Based on Neural Network Expert System in Virtualized Environment). |
计算机科学 |
2015 |
DBLP BibTeX RDF |
|
24 | Lei Sun, Zhiyuan Zhao, Feiran Wang, Lei Jin |
Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. |
ICCCS |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Toby J. Richer, Grant Neale, Grant Osborne |
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. |
AISC |
2015 |
DBLP BibTeX RDF |
|
24 | Seyyedeh Atefeh Musavi, Mehdi Kharrazi |
Back to Static Analysis for Kernel-Level Rootkit Detection. |
IEEE Trans. Inf. Forensics Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Joshua Schiffman, David Kaplan |
The SMM Rootkit Revisited: Fun with USB. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Shawn Embleton, Sherri Sparks, Cliff Changchun Zou |
SMM rootkit: a new breed of OS independent malware. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ryan D. Riley |
A framework for prototyping and testing data-only rootkit attacks. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Xiongwei Xie, Weichao Wang |
Rootkit detection on virtual machines through deep information extraction at hypervisor-level. |
CNS |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Miroslaw Skrzewski |
Monitoring System's Network Activity for Rootkit Malware Detection. |
CN |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Stefan Vömel, Hermann Lenz |
Visualizing Indicators of Rootkit Infections in Memory Forensics. |
IMF |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim |
A Brief Survey on Rootkit Techniques in Malicious Codes. |
J. Internet Serv. Inf. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Woei-Jiunn Tsaur |
Strengthening digital rights management using a new driver-hidden rootkit. |
IEEE Trans. Consumer Electron. |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
Tracking Rootkit Footprints with a Practical Memory Analysis System. |
USENIX Security Symposium |
2012 |
DBLP BibTeX RDF |
|
24 | Adrian Pauna |
Improved self adaptive honeypots capable of detecting rootkit malware. |
COMM |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Chandrabhanu Mahapatra, S. Selvakumar 0001 |
An online cross view difference and behavior based kernel rootkit detector. |
ACM SIGSOFT Softw. Eng. Notes |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Anthony Desnos, Eric Filiol, Ivan Lefou |
Detecting (and creating !) a HVM rootkit (aka BluePill-like). |
J. Comput. Virol. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Matthias Schmidt 0001, Lars Baumgärtner, Pablo Graubner, David Böck, Bernd Freisleben |
Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments. |
PDP |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong |
KVM-based Detection of Rootkit Attacks. |
INCoS |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Dong-Hoon You, Bong-Nam Noh |
Android platform based linux kernel rootkit. |
MALWARE |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Bryan Dixon, Shivakant Mishra |
On rootkit and malware detection in smartphones. |
DSN Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
24 | Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001 |
Return-Oriented Rootkit without Returns (on the x86). |
ICICS |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Satyajit Grover, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, Michael E. Kounavis |
RKRD: Runtime Kernel Rootkit Detection. |
ICETE (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | O. Esoul |
VMX-rootkit : implementing malware with hardware virtual machine extensions. |
|
2008 |
RDF |
|
24 | Ken Dunham |
OrderGun.A: A Sophisticated Rootkit. |
Inf. Secur. J. A Glob. Perspect. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ken Chiang, Levi Lloyd |
A Case Study of the Rustock Rootkit and Spam Bot. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
24 | Felix C. Freiling, Bastian Schwittay |
Towards Reliable Rootkit Detection in Live Response. |
IMF |
2007 |
DBLP BibTeX RDF |
|
24 | Michael Bowman, Heath D. Brown, Paul Pitt |
An undergraduate rootkit research project: How available? How hard? How dangerous? |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ken Dunham |
Year of the Rootkit. |
Inf. Secur. J. A Glob. Perspect. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Markus Hansen |
DRM-Desaster: Das Sony BMG-Rootkit - Dubiose DRM-Software unterwandert System-Sicherheit. |
Datenschutz und Datensicherheit |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Jesse D. Kornblum |
Exploiting the Rootkit Paradox with Windows Memory Analysis. |
Int. J. Digit. EVid. |
2006 |
DBLP BibTeX RDF |
|
24 | Yi-Min Wang, Doug Beck |
Fast User-Mode Rootkit Scanner for the Enterprise. |
LISA |
2005 |
DBLP BibTeX RDF |
|
24 | John G. Levine |
A Methodology for Detecting and Classifying Rootkit Exploits. |
|
2004 |
RDF |
|
24 | Kyechan Lee, Kyubum Wee |
Detection of Loadable Kernel Module Rootkit. |
Security and Management |
2003 |
DBLP BibTeX RDF |
|
22 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
22 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Dynamic Analysis, Emulator, Rootkit |
22 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
A novel approach for a file-system integrity monitor tool of Xen virtual machine. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, intrusion detection, Linux, rootkit |
22 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
22 | Doug Wampler, James Graham |
A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Linux forensics, outlier analysis, rootkit detection |