Academic literature on the topic 'Rootkit'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rootkit.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Rootkit"

1

Nadim, Mohammad, Wonjun Lee, and David Akopian. "Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training." Electronic Imaging 2021, no. 3 (June 18, 2021): 34–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-034.

Full text
Abstract:
The core part of the operating system is the kernel, and it plays an important role in managing critical data structure resources for correct operations. The kernel-level rootkits are the most elusive type of malware that can modify the running OS kernel in order to hide its presence and perform many malicious activities such as process hiding, module hiding, network communication hiding, and many more. In the past years, many approaches have been proposed to detect kernel-level rootkit. Still, it is challenging to detect new attacks and properly categorize the kernel-level rootkits. Memory forensic approaches showed efficient results with the limitation against transient attacks. Cross-view-based and integrity monitoring-based approaches have their own weaknesses. A learning-based detection approach is an excellent way to solve these problems. In this paper, we give an insight into the kernel-level rootkit characteristic features and how the features can be represented to train learning-based models in order to detect known and unknown attacks. Our feature set combined the memory forensic, cross-view, and integrity features to train learning-based detection models. We also suggest useful tools that can be used to collect the characteristics features of the kernel-level rootkit.
APA, Harvard, Vancouver, ISO, and other styles
2

Heasman, John. "Rootkit threats." Network Security 2006, no. 1 (January 2006): 18–19. http://dx.doi.org/10.1016/s1353-4858(06)70326-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dunham, Ken. "OrderGun.A: A Sophisticated Rootkit." Information Systems Security 16, no. 2 (April 12, 2007): 123–26. http://dx.doi.org/10.1080/10658980601051763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dunham, Ken. "Year of the Rootkit." Information Systems Security 15, no. 6 (December 2006): 2–6. http://dx.doi.org/10.1080/10658980601051797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

KWON, Ohmin, Hyun KWON, and Hyunsoo YOON. "Rootkit inside GPU Kernel Execution." IEICE Transactions on Information and Systems E102.D, no. 11 (November 1, 2019): 2261–64. http://dx.doi.org/10.1587/transinf.2019edl8104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anande, T. J., T. K. Genger, and J. U. Abasiene. "Combating Kernel Rootkits on Linux Version 2.6 (Analysis of Rootkit Prevention, Detection and Correction)." International Journal of Applied Information Systems 10, no. 8 (April 6, 2016): 1–10. http://dx.doi.org/10.5120/ijais2016451540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.

Full text
Abstract:
In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.
APA, Harvard, Vancouver, ISO, and other styles
8

Josse, Sébastien. "Rootkit detection from outside the Matrix." Journal in Computer Virology 3, no. 2 (May 15, 2007): 113–23. http://dx.doi.org/10.1007/s11416-007-0045-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lacombe, Éric, Frédéric Raynal, and Vincent Nicomette. "Rootkit modeling and experiments under Linux." Journal in Computer Virology 4, no. 2 (October 25, 2007): 137–57. http://dx.doi.org/10.1007/s11416-007-0069-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hansen, Markus. "DRM-Desaster: Das Sony BMG-Rootkit." Datenschutz und Datensicherheit - DuD 30, no. 2 (February 2006): 95–97. http://dx.doi.org/10.1007/s11623-006-0026-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Rootkit"

1

Gach, Tomáš. "Generická detekce bootkitů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236369.

Full text
Abstract:
This thesis deals with the generic detection of bootkits which are relatively a new kind of malicious sofware falling into the category of rootkits. The definition of malicious software is presented along with several examples. Then the attention is paid to the rootkits in the context of Microsoft Windows operating systems. This section lists several techniques used by rootkits. After that, the ways of preventing and detecting rootkits are mentioned. Bootkits are known for infecting hard disks Master Boot Record (MBR). The structure of the MBR is described along with the example of hard disk partitioning. Afterwards, the processor instruction set is outlined and the disassembly of Windows 7 MBR is given. The rest of the thesis is devoted to a description of the course of operating system bootkit infection, bootkit prevention, analysis of infected MBR samples, and in particular to the design, implementation and testing of the generic MBR infection detector.
APA, Harvard, Vancouver, ISO, and other styles
2

Plocek, Radovan. "Klasifikace rootkitů a jimi používaných technik." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412900.

Full text
Abstract:
This paper describes information about current most widespread methods, which are used by rootkits. It contains basic information connected with development of rootkits, such as process registers, memory protection and native API of Windows operation system. The primary objective of this paper is to provide overview of techniques, such as hooking, code patching and direct kernel object modification, which are used by rootkits and present methods to detect them. These methods will be then implemented by detection and removal tools of rootkits based on these techniques.
APA, Harvard, Vancouver, ISO, and other styles
3

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Full text
Abstract:
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. A formal framework was developed in order to define rootkit exploits as an existing rootkit, a modification to an exisiting, or an entirely new rootkit. A methodology was then described in order to apply this framework against rootkits that are to be investigated. We then proposed some new methods to detect and characterize specific types of rootkit exploits. These methods consisted of identifying unique string signatures of binary executable files as well as examining the system call table within the system kernel. We established a Honeynet in order to aid in our research efforts and then applied our methodology to a previously unseen rootkit that was targeted against the Honeynet. By using our methodology we were able to uniquely characterize this rootkit and identify some unique signatures that could be used in the detection of this specific rootkit. We applied our methodolgy against nine additional rootkit exploits and were were able to identify unique characterstics for each of these rootkits. These charactersitics could also be used in the prevention and detection of these rootkits.
APA, Harvard, Vancouver, ISO, and other styles
4

Vibhute, Tejaswini Ajay. "EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4485.

Full text
Abstract:
The use of virtualized environments continues to grow for efficient utilization of the available compute resources. Hypervisors virtualize the underlying hardware resources and allow multiple Operating Systems to run simultaneously on the same infrastructure. Since the hypervisor is installed at a higher privilege level than the Operating Systems in the software stack it is vulnerable to rootkits that can modify the environment to gain control, crash the system and even steal sensitive information. Thus, runtime integrity measurement of the hypervisor is essential. The currently proposed solutions achieve the goal by relying either partially or entirely on the features of the hypervisor itself, causing them to lack stealth and leaving themselves vulnerable to attack. We have developed a performance sensitive methodology for identifying rootkits in hypervisors from System Management Mode (SMM) while using the features of SMI Transfer Monitor (STM). STM is a recent technology from Intel and it is a virtual machine manager at the firmware level. Our solution extends a research prototype called EPA-RIMM, developed by Delgado and Karavanic at Portland State University. Our solution extends the state of the art in that it stealthily performs measurements of hypervisor memory and critical data structures using firmware features, keeps performance perturbation to acceptable levels and leverages the security features provided by the STM. We describe our approach and include experimental results using a prototype we have developed for Xen hypervisor on Minnowboard Turbot, an open hardware platform.
APA, Harvard, Vancouver, ISO, and other styles
5

Esoul, O. "VMX-rootkit : implementing malware with hardware virtual machine extensions." Thesis, University of Salford, 2008. http://usir.salford.ac.uk/26667/.

Full text
Abstract:
Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and early 2006, both, Intel™ and AMD™ incorporated explicit hardware support for virtualization into their CPUs. While this hardware support can help simplify the design and the implementation of a light-weight and efficient Virtual Machine Monitors (VMMs), this technology has introduced a new powerful mechanism that can be used by malware to create extremely stealthy rootkit called hardware-assisted virtual machine rootkit (HVM rootkit). An HVM rootkit is capable of totally controlling a compromised system by installing a small VMM (a.k.a. hyper- visor) underneath the operating system and its applications without altering any part of the target operating system or any part of its applications. It places the existing operating system into a virtual machine and turns it into a guest operating system on-the-fly without a reboot. The guest operating system is then totally governed and manipulated by the malicious hypervisor. In this thesis I have investigated the design and implementation of a minimal hypervisor based Rootkit that takes advantage of Intel Visualization Technology (Intel VT) for the IA-32 architecture (VT-x) and Microsoft Windows XP SP2 as the target operating system.
APA, Harvard, Vancouver, ISO, and other styles
6

Vasisht, Vikas R. "Architectural support for autonomic protection against stealth by rootkit exploits." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26618.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Lee, Hsien-Hsin; Committee Member: Blough, Douglas; Committee Member: Copeland, John. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
7

Xuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.
Committee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.

Full text
Abstract:
Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these technologies brings great value to our daily life, the lucrative reward from cyber-crimes has also attracted criminals. As computing continues to play an increasing role in the society, security has become a pressing issue. Failures in computing systems could result in loss of infrastructure or human life, as demonstrated in both academic research and production environment. With the continuing widespread of malicious software and new vulnerabilities revealing every day, protecting the heterogeneous computing systems across the Internet has become a daunting task. Our approach to this challenge consists of two directions. The first direction aims to gain a better understanding of the inner working of both attacks and defenses in the cyber environment. Meanwhile, our other direction is designing secure systems in adversarial environment.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
9

Persson, Emil, and Joel Mattsson. "Debug register rootkits : A study of malicious use of the IA-32 debug registers." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3609.

Full text
Abstract:
The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. This paper investigates the debug register rootkit to find out why it is considered a threat, and which malware removal tools have implemented detection algorithms against this threat. By implementing and running a debug register rootkit against the most popular Linux tools, new conclusions about the protection of the Linux system can be reached. Recently, debug register rootkits were found on Windows as well. This project intends to bring knowledge about the problem and investigate if there are any threats. Our study has shown that still after 12 years, the most popular tools for the Linux operating system have not implemented any detection algorithms against this threat. The security industry may need to prepare for this threat in case it is spread further.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jie, and Yuting Lu. "Rootkits." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8378.

Full text
Abstract:

Abstract:The kernel system of Windows is more thoroughly exposed to people. So, thekernel-level Rootkits techniques are now laid on greater emphasis. It is very importantto maintain the security of computers and to conduct an in-depth research on theoperational mechanism by using kernel-level Rootkits in hiding its traces. Since theinvolved core techniques are beginning to catch on nowadays, we should analyzesome new key techniques employed for application of Rootkits, discuss the specificmethods and propose a set of defense strategy for computer security.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Rootkit"

1

The rootkit arsenal. Plano, Tex: Wordware Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rootkit arsenal: Escape and evasion in the dark corners of the system. 2nd ed. Burlington, Mass: Jones & Bartlett Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nancy, Altholz, ed. Rootkits for dummies. Indianapolis, Ind: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stevenson, Larry. Rootkits For Dummies. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stevenson, Larry. Rootkits for dummies. Indianapolis, Ind: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stevenson, Larry. Rootkits for dummies. Indianapolis, Ind: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Michael A. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Naumoff, Lawrence. Rootie Kazootie. New York: Farrar, Straus & Giroux, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rootie Kazootie. San Diego: Harcourt Brace, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Rootkit"

1

Joy, Jestin, Anita John, and James Joy. "Rootkit Detection Mechanism: A Survey." In Advances in Parallel Distributed Computing, 366–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24037-9_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wright, Paul. "Rootkit Checker and Security Monitoring." In Protecting Oracle Database 12c, 183–206. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6212-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grover, Satyajit, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, and Michael E. Kounavis. "RKRD: Runtime Kernel Rootkit Detection." In Communications in Computer and Information Science, 224–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05197-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skrzewski, Mirosław. "Monitoring System’s Network Activity for Rootkit Malware Detection." In Computer Networks, 157–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Ping, Xiao Xing, Bing Mao, and Li Xie. "Return-Oriented Rootkit without Returns (on the x86)." In Information and Communications Security, 340–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Ming, Xiangrong Wang, Zhengqiu Lu, Meng Chen, and Qingzhang Chen. "Research on Honeypot Protection Technology Based on Rootkit." In 2011 International Conference in Electrics, Communication and Automatic Control Proceedings, 1267–73. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8849-2_163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Das, Prasenjit. "Conservation of Feature Sub-spaces Across Rootkit Sub-families." In Communications in Computer and Information Science, 179–91. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0755-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Joy, Jestin, and Anita John. "A Host Based Kernel Level Rootkit Detection Mechanism Using Clustering Technique." In Communications in Computer and Information Science, 564–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsaur, Woei-Jiunn, Yuh-Chen Chen, and Being-Yu Tsai. "A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation." In Algorithms and Architectures for Parallel Processing, 202–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03095-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Lei, Zhiyuan Zhao, Feiran Wang, and Lei Jin. "Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment." In Cloud Computing and Security, 437–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Rootkit"

1

Butler, Kevin R. B., Stephen McLaughlin, and Patrick D. McDaniel. "Rootkit-resistant disks." In the 15th ACM conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1455770.1455821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tsaur, Woei-Jiunn, and Yuh-Chen Chen. "Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit." In 2010 IEEE Second International Conference on Social Computing (SocialCom). IEEE, 2010. http://dx.doi.org/10.1109/socialcom.2010.127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bowman, Michael, Heath D. Brown, and Paul Pitt. "An undergraduate rootkit research project." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Behrozinia, Soudeh, and Reza Azmi. "KLrtD: Kernel level rootkit detection." In 2014 22nd Iranian Conference on Electrical Engineering (ICEE). IEEE, 2014. http://dx.doi.org/10.1109/iraniancee.2014.6999692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Francis M., Ellick M. Chan, Jeffrey C. Carlyle, and Roy H. Campbell. "Cloaker: Hardware Supported Rootkit Concealment." In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 2008. http://dx.doi.org/10.1109/sp.2008.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lobo, Desmond, Paul Watters, and Xin-Wen Wu. "Identifying Rootkit Infections Using Data Mining." In 2010 International Conference on Information Science and Applications. IEEE, 2010. http://dx.doi.org/10.1109/icisa.2010.5480359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

You, Dong-Hoon, and Bong-Nam Noh. "Android platform based linux kernel rootkit." In 2011 6th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2011. http://dx.doi.org/10.1109/malware.2011.6112330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Xingjun, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, and Xiaoshe Dong. "KVM-based Detection of Rootkit Attacks." In 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2011. http://dx.doi.org/10.1109/incos.2011.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lobo, D., P. Watters, and Xinwen Wu. "RBACS: Rootkit Behavioral Analysis and Classification System." In 2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010). IEEE, 2010. http://dx.doi.org/10.1109/wkdd.2010.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kuzminykh, Ievgeniia, and Maryna Yevdokymenko. "Analysis of Security of Rootkit Detection Methods." In 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT). IEEE, 2019. http://dx.doi.org/10.1109/atit49449.2019.9030428.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Rootkit"

1

Vibhute, Tejaswini. EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.6369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Dongyan, Eugene H. Spafford, and Xuxian Jiang. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada609410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography