Architectural support for autonomic protection against stealth by rootkit exploits
Operating system security has become a growing concern these days. As the complexity of software layers increases, the vulnerabilities that can be exploited by adversaries increases. Rootkits are gaining much attention these days in cyber-security. Rootkits are installed by an adversary after he/she...
Main Author: | Vasisht, Vikas R. |
---|---|
Published: |
Georgia Institute of Technology
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/26618 |
Similar Items
-
A Methodology for Detecting and Classifying Rootkit Exploits
by: Levine, John G. (John Glenn)
Published: (2005) -
Utilizing rootkits to address the vulnerabilities exploited by malware
by: Corregedor, Manuel Rodrigues
Published: (2012) -
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments
by: Vibhute, Tejaswini Ajay
Published: (2018) -
Τεχνικές ανίχνευσης rootkit και ανάπτυξη εφαρμογής για την αφαίρεσή του
by: Κοζυράκης, Ιωάννης - Μάριος
Published: (2009) -
Countering kernel malware in virtual execution environments
by: Xuan, Chaoting
Published: (2010)