𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the 17th ACM conference - Chicago, Illinois, USA (2010.10.04-2010.10.08)] Proceedings of the 17th ACM conference on Computer and communications security - CCS '10 - In God we trust all others we monitor

✍ Scribed by Stewin, Patrick; Seifert, Jean-Pierre


Book ID
121383136
Publisher
ACM Press
Year
2010
Weight
542 KB
Category
Article
ISBN
1450302459

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


[ACM Press the 17th ACM conference - Chi
✍ Stewin, Patrick; Seifert, Jean-Pierre πŸ“‚ Article πŸ“… 2010 πŸ› ACM Press βš– 542 KB

Modern x86 platforms offer stealth capabilities, that are exploited by rootkits to hide malicious code as shown by the rootkit evolution. Recently, security researchers discovered a very powerful execution environment for rootkits that is isolated from the actual x86 host platform. According to the

[ACM Press the 17th ACM conference - Chi
✍ Caballero, Juan; Poosankam, Pongsin; McCamant, Stephen; Babi Δ‡, Domagoj; Song, D πŸ“‚ Article πŸ“… 2010 πŸ› ACM Press βš– 499 KB

Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before they are exploited. But there has been little research on the converse question of whether defenders can turn the tables