Author of the publication

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.

, , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 1-20. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating code-reuse attacks with control-flow locking., , and . ACSAC, page 353-362. ACM, (2011)Intrusion Detection Models Based on Data Mining., , and . Int. J. Comput. Intell. Syst., 5 (1): 30-38 (2012)Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention., , and . J. Parallel Distributed Comput., 66 (9): 1165-1180 (2006)vEye: behavioral footprinting for self-propagating worm detection and profiling., and . Knowl. Inf. Syst., 18 (2): 231-262 (2009)Countering Persistent Kernel Rootkits through Systematic Hook Discovery., , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 21-38. Springer, (2008)vBET: a VM-based emulation testbed., and . MoMeTools@SIGCOMM, page 95-104. ACM, (2003)CCS'12 co-located workshop summary for SPSM 2012., and . CCS, page 1062-1063. ACM, (2012)On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers., , , , and . AsiaCCS, page 61-69. ACM, (2009)Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 418-435. Springer, (2012)AirBag: Boosting Smartphone Resistance to Malware Infection., , , , and . NDSS, The Internet Society, (2014)