Towards a tamper-resistant kernel rootkit detector

NA Quynh, Y Takefuji - Proceedings of the 2007 ACM symposium on …, 2007‏ - dl.acm.org
A variety of tools and architectures have been developed to detect security violations to
Operating System kernels. However, they all have fundamental flaw in the design so that …

Hijacking the linux kernel

B Procházka, T Vojnar… - Sixth Doctoral Workshop …, 2011‏ - drops.dagstuhl.de
In this paper, a new method of hijacking the Linux kernel is presented. It is based on
analysing the Linux system call handler, where a proper set of instructions is subsequently …

[PDF][PDF] Schutz verteilter Intrusion-Detection-Systeme gegen Denial-of-Service-Angriffe

M Jahnke, F für angewandte Naturwissenschaften eV - 2003‏ - marko-jahnke.de
Ein geschütztes System kann immer höchstens so sicher sein wie das Schutzsystem selbst.
Dies gilt in Zeiten immer häufiger auftretender Angriffe gegen Computersysteme auch und …

[PDF][PDF] A Taxonomy of Software Deceptive Interpretation in the

JIM Luo, M Li - 2004‏ - Citeseer
Rootkits are malicious tools installed on compromised computer systems that help intruders
take advantage of and maintain unauthorized access. Modem rootkits routinely employ …

[PDF][PDF] VYSOKÉ UČENI TECHNICKE V BRNE

PA Nečas‏ - theses.cz
Tato bakalářská práce se zabývá vývojem biodegradabilního 3D anatomického modelu seg
mentu femuru a vlivem technologie 3D tisku na pevnost v tahu a modul pružnosti v tahu u …

[PDF][PDF] VYSOKEUCˇENÍTECHNICKEV BRNEˇ

PRA CE - Conference on, s, 2010‏ - dspace.vut.cz
The master thesis is focused on the principle of ultrasonographs and their modes, and ways
of denoising data obtained by ultrasonographs. This project will also concentrate on …