Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Rootkit
Known as:
Bootkit
, Rootkit/archive
, Anti-rootkit
Expand
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Application programming interface
Authentication
BIOS
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Network detection of ransomware delivered by exploit kit
P. Raunak
,
P. Krishnan
2017
Corpus ID: 67407493
Ransomware is an emerging cyber threat having a clear intention of money making in the form of ransom. This timeits not a virus…
Expand
2015
2015
Acquisition and analysis of compromised firmware using memory forensics
Johannes Stüttgen
,
Stefan Vömel
,
Michael Denzel
Digital Investigation. The International Journal…
2015
Corpus ID: 5939783
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2013
2013
Exploiting visual appearance to cluster and detect rogue software
Christian J. Dietrich
,
C. Rossow
,
N. Pohlmann
ACM Symposium on Applied Computing
2013
Corpus ID: 15126342
Rogue software, such as Fake A/V and ransomware, trick users into paying without giving return. We show that using a perceptual…
Expand
2013
2013
VILO: a rapid learning nearest-neighbor classifier for malware triage
Arun Lakhotia
,
Andrew Walenstein
,
Craig Miles
,
Anshuman Singh
Journal of Computer Virology and Hacking…
2013
Corpus ID: 10567023
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm…
Expand
2013
2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
Irfan Ahmed
,
G. Richard
,
Aleksandar Zoranic
,
Vassil Roussev
Information Security Conference
2013
Corpus ID: 6968940
With the introduction of kernel integrity checking mechanisms in modern operating systems, such as PatchGuard on Windows OS…
Expand
2011
2011
Security Analysis of TrueCrypt 7 . 0 a with an Attack on the Keyfile Algorithm
2011
Corpus ID: 16033543
Preface…
Expand
2009
2009
A decision support system for constructing an alert classification model
Nien-Yi Jan
,
Shun-Chieh Lin
,
S. Tseng
,
Nancy P. Lin
Expert systems with applications
2009
Corpus ID: 28116540
Review
2009
Review
2009
Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent
J. Schäfer
,
K. Malinka
Fourth International Conference on Internet…
2009
Corpus ID: 17780259
In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer…
Expand
2007
2007
Advanced Polymorphic Techniques
Philippe Beaucamps
2007
Corpus ID: 85805107
Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE