|
Up
|
|
|
|
|
2008-03-14 - Comparison of File Infection on the Windows and Linux.pdf
|
|
|
|
|
2008-05-18 - Cloaker - Hardware Supported Rootkit Concealment.pdf
|
|
|
|
|
2008-07-07 - Comparison of File Infection on the Windows and Linux.pdf
|
|
|
|
|
2008-10-27 - Rootkit-Resistant Disks.pdf
|
|
|
|
|
2009-06-05 - Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest-Transparent Monitoring.pdf
|
|
|
|
|
2013-09-03 - UEFI Secure Boot in Modern Computer Security Solutions.pdf
|
|
|
|
|
2015-10-26 - Kernel Data Attack is a Realistic Security Threat.pdf
|
|
|
|
|
2017-03-17 - Stealthy Malware Traffic - Not as Innocent as It Looks.pdf
|
|
|
|
|
2017-08-23 - CloudSkulk - Design of a Nested VM-Based RITM Attack.pdf
|
|
|
|
|
2017-10-25 - Obfuscation with Mixed Boolean-Arithmetic Expressions - reconstruction, analysis and simplification tools.pdf
|
|
|
|
|
2019-04-28 - Playing with Namespaces - Writing Docker-Aware Rootkits.pdf
|
|
|
|
|
2019-08-20 - Virtual Machine Detection In The Browser.pdf
|
|
|
|
|
2021-09-24 - Obfuscation Defeated - Leveraging electromagnetic signals for malware classification with Deep learning.pdf
|
|
|
|
|
2021-10-21 - Obfuscation Revealed - Leveraging Electromagnetic Signals for Obfuscated Malware Classification.pdf
|
|
|
|
|
2021-11-13 - SmashEx - Smashing SGX Enclaves Using Exceptions.pdf
|
|
|
|
|
2021-11-15 - Design issues of modern EDRs bypassing ETW-based solutions.pdf
|
|
|
|
|
2021-12-15 - Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature.pdf
|
|
|
|
|
2022-07-05 - Countering Kernel Rootkits with Lightweight Hook Protection.pdf
|
|
|
|
|
2022-07-05 - Countering Persistent Kernel Rootkits Through Systematic Hook Discovery.pdf
|
|
|
|
|
2022-07-13 - Design of a Hypervisor-based Rootkit Detection Method for Virtualized Systems in Cloud Computing Environments.pdf
|
|
|
|
|
2023-06-25 - SleeperAgent.7z
|
|
|
|
|
2023-07-31 - Intel Redirect Protection Internals.7z
|
|
|
|
|
2024-09-03 - RAMBO - Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM.pdf
|
|
|
|
|
2024-09-07 - PIXHELL Attack - Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'.pdf
|
|
|
|