A methodology to detect and characterize Kernel level rootkit exploits involving redirection of the system call table
暂无分享,去创建一个
[1] Harold W. Thimbleby,et al. A Framework for Modelling Trojans and Computer Virus Infection , 1998, Comput. J..
[2] Stephen Northcutt. Inside Network Perimeter Security , 2005 .
[3] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[4] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[5] Peter Baer Galvin,et al. Applied Operating System Concepts , 1999 .
[6] J.B. Grizzard,et al. A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table , 2004, IEEE SoutheastCon, 2004. Proceedings..
[7] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[8] Stephen Northcutt,et al. Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems , 2002 .