Modern x86 platforms offer stealth capabilities, that are exploited by rootkits to hide malicious code as shown by the rootkit evolution. Recently, security researchers discovered a very powerful execution environment for rootkits that is isolated from the actual x86 host platform. According to the
β¦ LIBER β¦
[ACM Press the 17th ACM conference - Chicago, Illinois, USA (2010.10.04-2010.10.08)] Proceedings of the 17th ACM conference on Computer and communications security - CCS '10 - In God we trust all others we monitor
β Scribed by Stewin, Patrick; Seifert, Jean-Pierre
- Book ID
- 121383136
- Publisher
- ACM Press
- Year
- 2010
- Weight
- 542 KB
- Category
- Article
- ISBN
- 1450302459
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
[ACM Press the 17th ACM conference - Chi
β
Stewin, Patrick; Seifert, Jean-Pierre
π
Article
π
2010
π
ACM Press
β 542 KB
[ACM Press the 17th ACM conference - Chi
β
K ΓΌsters, Ralf; Truderung, Tomasz; Vogt, Andreas
π
Article
π
2010
π
ACM Press
β 543 KB
[ACM Press the 17th ACM conference - Chi
β
Grier, Chris; Thomas, Kurt; Paxson, Vern; Zhang, Michael
π
Article
π
2010
π
ACM Press
β 753 KB
[ACM Press the 17th ACM conference - Chi
β
Sahai, Amit; Seyalioglu, Hakan
π
Article
π
2010
π
ACM Press
β 565 KB
[ACM Press the 17th ACM conference - Chi
β
Caballero, Juan; Poosankam, Pongsin; McCamant, Stephen; Babi Δ, Domagoj; Song, D
π
Article
π
2010
π
ACM Press
β 499 KB
[ACM Press the 17th ACM conference - Chi
β
Caballero, Juan; Poosankam, Pongsin; McCamant, Stephen; Babi Δ, Domagoj; Song, D
π
Article
π
2010
π
ACM Press
β 499 KB
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before they are exploited. But there has been little research on the converse question of whether defenders can turn the tables