Information Technology Reference
In-Depth Information
Petroni, N., Jr., Fraser, T., Molina, J., & Arbaugh,
W.A. (2004). Copilot - a coprocessor-based kernel
runtime integrity monitor. In Proceedings of the
USENIX Security Symposium , San Diego, CA.
Shellcode Security Research Team. (2006). Regis-
tration weakness in linux kernel's binary formats .
Retrieved from http://goodfellas.shellcode.com.
ar/own/binfmt-en.pdf.
Rutkowska, J. (2007). Defeating hardware based
ram acquisition. Blackhat Conference , Arlington,
VA.
Wang, H., Zhang, D., & Shin, K. (2002). Detect-
ing syn flooding attacks. In Proceedings of the
INFOCOM Conference , Manhattan, NY.
Schuba, C. L., Krsul, I. V., & Kuhn, M. G. spaf-
ford, E. H., Sundaram, A. & Zamboni, D. (1997).
Analysis of a denial of service attack on tcp. In
Proceedings of the 1997 Symposium on Security
and Privacy , Oakland, CA.
Wang, Y., Beck, D., Vo, B., Roussev, R., & Ver-
bowski, C. (2005). Detecting stealth software
with strider ghostbuster. Proceedings of the 2005
International Conference on Dependable Systems
and Networks , Yokohama, Japan.
Shamir, A., & van Someren, N. (1999). Playing
”hide and seek” with stored keys. In Proceedings
of the Third International Conference on Financial
Cryptography , London, UK.
Zhang, X., van Doorn, L., Jaeger, T., Perez, R.,
& Sailer, R. (2002). Secure coprocessor-based
intrusion detection. In Proceedings of the 10th
workshop on ACM SIGOPS European workshop ,
St-Emilion, France.
Search WWH ::




Custom Search