/vx/Papers/Other/Advanced Malware/

0 directories 24 files
List Grid
Name
Size Modified
Up
2008-03-14 - Comparison of File Infection on the Windows and Linux.pdf
214 KiB
2008-05-18 - Cloaker - Hardware Supported Rootkit Concealment.pdf
228 KiB
2008-07-07 - Comparison of File Infection on the Windows and Linux.pdf
437 KiB
2008-10-27 - Rootkit-Resistant Disks.pdf
837 KiB
2009-06-05 - Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest-Transparent Monitoring.pdf
153 KiB
2013-09-03 - UEFI Secure Boot in Modern Computer Security Solutions.pdf
436 KiB
2015-10-26 - Kernel Data Attack is a Realistic Security Threat.pdf
640 KiB
2017-03-17 - Stealthy Malware Traffic - Not as Innocent as It Looks.pdf
584 KiB
2017-08-23 - CloudSkulk - Design of a Nested VM-Based RITM Attack.pdf
2.8 MiB
2017-10-25 - Obfuscation with Mixed Boolean-Arithmetic Expressions - reconstruction, analysis and simplification tools.pdf
1.9 MiB
2019-04-28 - Playing with Namespaces - Writing Docker-Aware Rootkits.pdf
528 KiB
2019-08-20 - Virtual Machine Detection In The Browser.pdf
429 KiB
2021-09-24 - Obfuscation Defeated - Leveraging electromagnetic signals for malware classification with Deep learning.pdf
9.6 MiB
2021-10-21 - Obfuscation Revealed - Leveraging Electromagnetic Signals for Obfuscated Malware Classification.pdf
5.2 MiB
2021-11-13 - SmashEx - Smashing SGX Enclaves Using Exceptions.pdf
918 KiB
2021-11-15 - Design issues of modern EDRs bypassing ETW-based solutions.pdf
10 MiB
2021-12-15 - Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature.pdf
686 KiB
2022-07-05 - Countering Kernel Rootkits with Lightweight Hook Protection.pdf
188 KiB
2022-07-05 - Countering Persistent Kernel Rootkits Through Systematic Hook Discovery.pdf
155 KiB
2022-07-13 - Design of a Hypervisor-based Rootkit Detection Method for Virtualized Systems in Cloud Computing Environments.pdf
1.6 MiB
2023-06-25 - SleeperAgent.7z
11 GiB
2023-07-31 - Intel Redirect Protection Internals.7z
14 MiB
2024-09-03 - RAMBO - Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM.pdf
16 MiB
2024-09-07 - PIXHELL Attack - Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'.pdf
32 MiB