Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. Hund, R., Holz, T., & Freiling, F. C. In 18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings, pages 383--398, 2009.
Paper bibtex @inproceedings{DBLP:conf/uss/HundHF09,
author = {Ralf Hund and
Thorsten Holz and
Felix C. Freiling},
title = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection
Mechanisms},
booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
2009, Proceedings},
pages = {383--398},
year = {2009},
crossref = {DBLP:conf/uss/2009},
url = {http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf},
timestamp = {Thu, 15 May 2014 18:36:21 +0200},
biburl = {http://dblp.org/rec/bib/conf/uss/HundHF09},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"gF94BkGyRpZSNTCpK","bibbaseid":"hund-holz-freiling-returnorientedrootkitsbypassingkernelcodeintegrityprotectionmechanisms-2009","downloads":0,"creationDate":"2016-10-15T13:23:23.750Z","title":"Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms","author_short":["Hund, R.","Holz, T.","Freiling, F. C."],"year":2009,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ralf"],"propositions":[],"lastnames":["Hund"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]},{"firstnames":["Felix","C."],"propositions":[],"lastnames":["Freiling"],"suffixes":[]}],"title":"Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms","booktitle":"18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings","pages":"383--398","year":"2009","crossref":"DBLP:conf/uss/2009","url":"http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf","timestamp":"Thu, 15 May 2014 18:36:21 +0200","biburl":"http://dblp.org/rec/bib/conf/uss/HundHF09","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/uss/HundHF09,\n author = {Ralf Hund and\n Thorsten Holz and\n Felix C. Freiling},\n title = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection\n Mechanisms},\n booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,\n 2009, Proceedings},\n pages = {383--398},\n year = {2009},\n crossref = {DBLP:conf/uss/2009},\n url = {http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf},\n timestamp = {Thu, 15 May 2014 18:36:21 +0200},\n biburl = {http://dblp.org/rec/bib/conf/uss/HundHF09},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Hund, R.","Holz, T.","Freiling, F. C."],"key":"DBLP:conf/uss/HundHF09","id":"DBLP:conf/uss/HundHF09","bibbaseid":"hund-holz-freiling-returnorientedrootkitsbypassingkernelcodeintegrityprotectionmechanisms-2009","role":"author","urls":{"Paper":"http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf"},"downloads":0},"search_terms":["return","oriented","rootkits","bypassing","kernel","code","integrity","protection","mechanisms","hund","holz","freiling"],"keywords":["rootkits","rop"],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}