Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
141 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
132 | Jinku Li, Zhi Wang 0004, Xuxian Jiang, Michael C. Grace, Sina Bahram |
Defeating return-oriented rootkits with "Return-Less" kernels. |
EuroSys |
2010 |
DBLP DOI BibTeX RDF |
return-less kernel, return-oriented rootkits, defense |
132 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
108 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
99 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
99 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
99 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Automatic Inference and Enforcement of Kernel Data Structure Invariants. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
91 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
74 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
66 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
66 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
65 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
rootkits, rootkit, Invasive software |
65 | Sandra Ring, Eric Cole |
Taking a Lesson from Stealthy Rootkits. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
reverse engineering, rootkits, malicious code, software obfuscation |
58 | Doug Wampler, James Graham |
A Method for Detecting Linux Kernel Module Rootkits. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Linux forensics, outlier analysis, rootkit detection |
58 | Lifu Wang, Partha Dasgupta |
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Rootkit-resistant disks. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security, storage, labels, rootkits |
50 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
50 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
50 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Detecting Kernel-Level Rootkits Using Data Structure Invariants. |
IEEE Trans. Dependable Secur. Comput. |
2011 |
DBLP DOI BibTeX RDF |
Kernel-level rootkits, noncontrol data attacks, invariant inference, static and dynamic program analysis |
41 | Loïc Duflot, Olivier Levillain, Benjamin Morin |
ACPI: Design Principles and Concerns. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
ACPI, trusted platforms, rootkits |
41 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
41 | David Geer |
Hackers Get to the Root of the Problem. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Security, Hackers, Rootkits |
33 | Woei-Jiunn Tsaur, Yuh-Chen Chen, Being-Yu Tsai |
A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
kernel mode, Information security, malware, Windows, rootkit |
33 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan |
A hypervisor-based system for protecting software runtime memory and persistent storage. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor |
33 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 |
Towards Protecting Sensitive Files in a Compromised System. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani |
Detecting eBPF Rootkits Using Virtualization and Memory Forensics. |
ICISSP |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Maryam Mohammadzad, Jaber Karimpour |
Using rootkits hiding techniques to conceal honeypot functionality. |
J. Netw. Comput. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig |
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits. |
SP (Workshops) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani 0001 |
A game-theoretic defensive approach for forensic investigators against rootkits. |
Digit. Investig. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Wonjun Lee, Mohammad Nadim |
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers. |
CSCloud/EdgeCom |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Prashanth Krishnamurthy, Hossein Salehghaffari, Shiva Duraisamy, Ramesh Karri, Farshad Khorrami |
Stealthy Rootkits in Smart Grid Controllers. |
ICCD |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jacob Taylor, Benjamin P. Turnbull, Gideon Creech |
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. |
ARES |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Toshihiro Yamauchi, Yohei Akao |
Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. |
IEICE Trans. Inf. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Igor Korkin, Satoshi Tanda |
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
25 | Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato |
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. |
AsiaCCS |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Julian Rauchberger, Robert Luh, Sebastian Schrittwieser |
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. |
ICISSP |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Amrita Milind Honap, Wonjun Lee 0003 |
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Grimm, Irfan Ahmed 0001, Vassil Roussev, Manish Bhatt, Manpyo Hong |
Automatic Mitigation of Kernel Rootkits in Cloud Environments. |
WISA |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke 0001, Thorsten Holz |
SDN-Guard: Protecting SDN controllers against SDN rootkits. |
NFV-SDN |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Earle Jennings |
Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits. |
ICRC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Matt Spisak |
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures. |
WOOT |
2016 |
DBLP BibTeX RDF |
|
25 | Robert Buhren, Julian Vetter, Jan Nordholz |
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Shabnam Aboughadareh, Christoph Csallner |
Detecting rootkits with the RAI runtime application inventory. |
SSPREW@ACSAC |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
25 | David Brumley |
Invisible Intruders: Rootkits in Practice. |
login Usenix Mag. |
2015 |
DBLP BibTeX RDF |
|
25 | Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi |
MOSKG: countering kernel rootkits with a secure paging mechanism. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Yohei Akao, Toshihiro Yamauchi |
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. |
IIAI-AAI |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Thu Yein Win, Huaglory Tianfield, Quentin Mair |
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. |
CSCloud |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Christian Röpke 0001, Thorsten Holz |
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici |
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis |
Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. |
ICISC |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
Detecting Kernel Control-Flow Modifying Rootkits. |
Network Science and Cybersecurity |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Graham Hili, Keith Mayes, Konstantinos Markantonakis |
The BIOS and Rootkits. |
Secure Smart Embedded Devices, Platforms and Applications |
2014 |
DBLP DOI BibTeX RDF |
|
25 | David Durham |
Mitigating exploits, rootkits and advanced persistent threats. |
Hot Chips Symposium |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Hiromasa Shimada, Tatsuo Nakajima |
Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden Rootkits. |
UIC/ATC/ScalCom |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun |
A Methodology for Hook-Based Kernel Level Rootkits. |
ISPEC |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Lingchen Zhang, Sachin Shetty, Peng Liu 0005, Jiwu Jing |
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. |
ESORICS (2) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Xueyang Wang, Ramesh Karri |
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. |
DAC |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. |
WorldCIS |
2012 |
DBLP BibTeX RDF |
|
25 | Padmaraj M. V. Nair |
Rootkits. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | E. Eugene Schultz |
Malicious Code: Rootkits. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Pablo Bravo, Daniel F. García |
Proactive Detection of Kernel-Mode Rootkits. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Corregedor, Sebastiaan H. von Solms |
Implementing Rootkits to Address Operating System Vulnerabilities. |
ISSA |
2011 |
DBLP BibTeX RDF |
|
25 | Daniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener |
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. |
Financial Cryptography |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey Bickford, Ryan O'Hare, Arati Baliga, Vinod Ganapathy, Liviu Iftode |
Rootkits on smart phones: attacks, implications and opportunities. |
HotMobile |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits. |
Intelligent Technical Systems |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Peng Ning |
Countering kernel rootkits with lightweight hook protection. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Ben Adida, Adam Barth, Collin Jackson |
Rootkits for JavaScript Environments. |
WOOT |
2009 |
DBLP BibTeX RDF |
|
25 | Ralf Hund, Thorsten Holz, Felix C. Freiling |
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. |
USENIX Security Symposium |
2009 |
DBLP BibTeX RDF |
|
25 | Arati Baliga, Liviu Iftode, Xiaoxin Chen |
Automated containment of rootkits attacks. |
Comput. Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Douglas R. Wampler, James H. Graham |
A Method for Detecting Windows Rootkits. |
CATA |
2008 |
DBLP BibTeX RDF |
|
25 | Shawn Embleton, Sherri Sparks, Cliff C. Zou |
SMM rootkits: a new breed of OS independent malware. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Lynn Erla Beegle |
Rootkits and Their Effects on Information Security. |
Inf. Secur. J. A Glob. Perspect. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang |
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. |
Int. J. Inf. Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Laggner, Eckehard Hermann |
Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise & Erkennung. |
Datenschutz und Datensicherheit |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Markus Kucera, Michael Vetter |
FPGA-Rootkits Hiding Malicious Code inside the Hardware. |
WISES |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - eine aktuelle Bedrohung. |
Datenschutz und Datensicherheit |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Wilhelm Dolle, Christoph Wegener |
Windows Rootkits - und ihre Erkennung. |
Datenschutz und Datensicherheit |
2006 |
DBLP DOI BibTeX RDF |
|
25 | James Butler, Sherri Sparks |
Spyware and Rootkits: The Future Convergence. |
login Usenix Mag. |
2004 |
DBLP BibTeX RDF |
|
24 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
24 | Zhi Wang 0004, Xuxian Jiang |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Control-Flow Integrity, Hypervisor, Rootkits |
24 | Edward W. Felten, J. Alex Halderman |
Digital Rights Management, Spyware, and Security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP |
24 | Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh |
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor |
17 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
17 | Flavio Lombardi, Roberto Di Pietro |
KvmSec: a security extension for Linux kernel virtual machines. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
kernel virtual machine, integrity, virtual machine, hypervisor, real-time monitoring |
17 | Nicolas Ruff |
Windows memory forensics. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson |
Timely Rootkit Detection During Live Response. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
live response, Rootkit detection |
17 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
17 | Sébastien Josse |
Rootkit detection from outside the Matrix. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
17 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards a tamper-resistant kernel rootkit detector. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, kernel rootkit, intrusion detection, Linux |