Computer viruses: theory and experiments
Computers and Security
Applied operating system concepts
Applied operating system concepts
A methodology for detecting and classifying rootkit exploits
A methodology for detecting and classifying rootkit exploits
Understanding The Linux Kernel
Understanding The Linux Kernel
SecureBus: towards application-transparent trusted computing with mandatory access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Linux kernel integrity measurement using contextual inspection
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A normality based method for detecting kernel rootkits
ACM SIGOPS Operating Systems Review
Banksafe information stealer detection inside the web browser
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Host based attack detection using system calls
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Characterizing hypervisor vulnerabilities in cloud computing servers
Proceedings of the 2013 international workshop on Security in cloud computing
Hi-index | 0.03 |
Existing techniques to detect kernel-level rootkits expose some infections, but they don't identify specific attacks. This rootkit categorization approach helps system administrators identify the extent of specific infections, aiding in optimal recovery and faster reactions to future attacks.