Academic literature on the topic 'Rootkit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rootkit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Rootkit"
Nadim, Mohammad, Wonjun Lee, and David Akopian. "Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training." Electronic Imaging 2021, no. 3 (June 18, 2021): 34–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-034.
Full textHeasman, John. "Rootkit threats." Network Security 2006, no. 1 (January 2006): 18–19. http://dx.doi.org/10.1016/s1353-4858(06)70326-9.
Full textDunham, Ken. "OrderGun.A: A Sophisticated Rootkit." Information Systems Security 16, no. 2 (April 12, 2007): 123–26. http://dx.doi.org/10.1080/10658980601051763.
Full textDunham, Ken. "Year of the Rootkit." Information Systems Security 15, no. 6 (December 2006): 2–6. http://dx.doi.org/10.1080/10658980601051797.
Full textKWON, Ohmin, Hyun KWON, and Hyunsoo YOON. "Rootkit inside GPU Kernel Execution." IEICE Transactions on Information and Systems E102.D, no. 11 (November 1, 2019): 2261–64. http://dx.doi.org/10.1587/transinf.2019edl8104.
Full textAnande, T. J., T. K. Genger, and J. U. Abasiene. "Combating Kernel Rootkits on Linux Version 2.6 (Analysis of Rootkit Prevention, Detection and Correction)." International Journal of Applied Information Systems 10, no. 8 (April 6, 2016): 1–10. http://dx.doi.org/10.5120/ijais2016451540.
Full textChen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.
Full textJosse, Sébastien. "Rootkit detection from outside the Matrix." Journal in Computer Virology 3, no. 2 (May 15, 2007): 113–23. http://dx.doi.org/10.1007/s11416-007-0045-1.
Full textLacombe, Éric, Frédéric Raynal, and Vincent Nicomette. "Rootkit modeling and experiments under Linux." Journal in Computer Virology 4, no. 2 (October 25, 2007): 137–57. http://dx.doi.org/10.1007/s11416-007-0069-6.
Full textHansen, Markus. "DRM-Desaster: Das Sony BMG-Rootkit." Datenschutz und Datensicherheit - DuD 30, no. 2 (February 2006): 95–97. http://dx.doi.org/10.1007/s11623-006-0026-4.
Full textDissertations / Theses on the topic "Rootkit"
Gach, Tomáš. "Generická detekce bootkitů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236369.
Full textPlocek, Radovan. "Klasifikace rootkitů a jimi používaných technik." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412900.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textVibhute, Tejaswini Ajay. "EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4485.
Full textEsoul, O. "VMX-rootkit : implementing malware with hardware virtual machine extensions." Thesis, University of Salford, 2008. http://usir.salford.ac.uk/26667/.
Full textVasisht, Vikas R. "Architectural support for autonomic protection against stealth by rootkit exploits." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26618.
Full textCommittee Chair: Lee, Hsien-Hsin; Committee Member: Blough, Douglas; Committee Member: Copeland, John. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Xuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.
Full textCommittee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Zhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.
Full textPh. D.
Persson, Emil, and Joel Mattsson. "Debug register rootkits : A study of malicious use of the IA-32 debug registers." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3609.
Full textLi, Jie, and Yuting Lu. "Rootkits." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8378.
Full textAbstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. Since theinvolved core techniques are beginning to catch on nowadays, we should analyzesome new key techniques employed for application of Rootkits, discuss the specificmethods and propose a set of defense strategy for computer security.
Books on the topic "Rootkit"
Rootkit arsenal: Escape and evasion in the dark corners of the system. 2nd ed. Burlington, Mass: Jones & Bartlett Learning, 2012.
Find full textSean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textDavis, Michael A. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textBook chapters on the topic "Rootkit"
Joy, Jestin, Anita John, and James Joy. "Rootkit Detection Mechanism: A Survey." In Advances in Parallel Distributed Computing, 366–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24037-9_36.
Full textWright, Paul. "Rootkit Checker and Security Monitoring." In Protecting Oracle Database 12c, 183–206. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6212-1_15.
Full textGrover, Satyajit, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, and Michael E. Kounavis. "RKRD: Runtime Kernel Rootkit Detection." In Communications in Computer and Information Science, 224–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05197-5_16.
Full textSkrzewski, Mirosław. "Monitoring System’s Network Activity for Rootkit Malware Detection." In Computer Networks, 157–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1_17.
Full textChen, Ping, Xiao Xing, Bing Mao, and Li Xie. "Return-Oriented Rootkit without Returns (on the x86)." In Information and Communications Security, 340–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_24.
Full textWang, Ming, Xiangrong Wang, Zhengqiu Lu, Meng Chen, and Qingzhang Chen. "Research on Honeypot Protection Technology Based on Rootkit." In 2011 International Conference in Electrics, Communication and Automatic Control Proceedings, 1267–73. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8849-2_163.
Full textDas, Prasenjit. "Conservation of Feature Sub-spaces Across Rootkit Sub-families." In Communications in Computer and Information Science, 179–91. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0755-3_14.
Full textJoy, Jestin, and Anita John. "A Host Based Kernel Level Rootkit Detection Mechanism Using Clustering Technique." In Communications in Computer and Information Science, 564–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_57.
Full textTsaur, Woei-Jiunn, Yuh-Chen Chen, and Being-Yu Tsai. "A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation." In Algorithms and Architectures for Parallel Processing, 202–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03095-6_21.
Full textSun, Lei, Zhiyuan Zhao, Feiran Wang, and Lei Jin. "Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment." In Cloud Computing and Security, 437–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7_37.
Full textConference papers on the topic "Rootkit"
Butler, Kevin R. B., Stephen McLaughlin, and Patrick D. McDaniel. "Rootkit-resistant disks." In the 15th ACM conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1455770.1455821.
Full textTsaur, Woei-Jiunn, and Yuh-Chen Chen. "Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit." In 2010 IEEE Second International Conference on Social Computing (SocialCom). IEEE, 2010. http://dx.doi.org/10.1109/socialcom.2010.127.
Full textBowman, Michael, Heath D. Brown, and Paul Pitt. "An undergraduate rootkit research project." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409916.
Full textBehrozinia, Soudeh, and Reza Azmi. "KLrtD: Kernel level rootkit detection." In 2014 22nd Iranian Conference on Electrical Engineering (ICEE). IEEE, 2014. http://dx.doi.org/10.1109/iraniancee.2014.6999692.
Full textDavid, Francis M., Ellick M. Chan, Jeffrey C. Carlyle, and Roy H. Campbell. "Cloaker: Hardware Supported Rootkit Concealment." In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 2008. http://dx.doi.org/10.1109/sp.2008.8.
Full textLobo, Desmond, Paul Watters, and Xin-Wen Wu. "Identifying Rootkit Infections Using Data Mining." In 2010 International Conference on Information Science and Applications. IEEE, 2010. http://dx.doi.org/10.1109/icisa.2010.5480359.
Full textYou, Dong-Hoon, and Bong-Nam Noh. "Android platform based linux kernel rootkit." In 2011 6th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2011. http://dx.doi.org/10.1109/malware.2011.6112330.
Full textZhang, Xingjun, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, and Xiaoshe Dong. "KVM-based Detection of Rootkit Attacks." In 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2011. http://dx.doi.org/10.1109/incos.2011.111.
Full textLobo, D., P. Watters, and Xinwen Wu. "RBACS: Rootkit Behavioral Analysis and Classification System." In 2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010). IEEE, 2010. http://dx.doi.org/10.1109/wkdd.2010.23.
Full textKuzminykh, Ievgeniia, and Maryna Yevdokymenko. "Analysis of Security of Rootkit Detection Methods." In 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT). IEEE, 2019. http://dx.doi.org/10.1109/atit49449.2019.9030428.
Full textReports on the topic "Rootkit"
Vibhute, Tejaswini. EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.6369.
Full textXu, Dongyan, Eugene H. Spafford, and Xuxian Jiang. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada609410.
Full text