Countering kernel rootkits with lightweight hook protection. Wang, Z., Jiang, X., Cui, W., & Ning, P. In Proc. of the 16th ACM Conf. on Computer and Commun. Security, pages 545--554, 2009.
Paper bibtex @inproceedings{wang_countering_2009,
title = {Countering kernel rootkits with lightweight hook protection},
url = {http://doi.acm.org/10.1145/1653662.1653728},
urldate = {2012-01-28TZ},
booktitle = {Proc. of the 16th {ACM} {Conf}. on {Computer} and {Commun}. {Security}},
author = {Wang, Zhi and Jiang, Xuxian and Cui, Weidong and Ning, Peng},
year = {2009},
keywords = {malware protection, rootkits, virtual machines},
pages = {545--554}
}
Downloads: 0
{"_id":"yAEdFkwbuvdbBsKLK","bibbaseid":"wang-jiang-cui-ning-counteringkernelrootkitswithlightweighthookprotection-2009","downloads":0,"creationDate":"2016-10-15T13:23:23.725Z","title":"Countering kernel rootkits with lightweight hook protection","author_short":["Wang, Z.","Jiang, X.","Cui, W.","Ning, P."],"year":2009,"bibtype":"inproceedings","biburl":"http://bibbase.org/zotero/pentarious","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Countering kernel rootkits with lightweight hook protection","url":"http://doi.acm.org/10.1145/1653662.1653728","urldate":"2012-01-28TZ","booktitle":"Proc. of the 16th ACM Conf. on Computer and Commun. Security","author":[{"propositions":[],"lastnames":["Wang"],"firstnames":["Zhi"],"suffixes":[]},{"propositions":[],"lastnames":["Jiang"],"firstnames":["Xuxian"],"suffixes":[]},{"propositions":[],"lastnames":["Cui"],"firstnames":["Weidong"],"suffixes":[]},{"propositions":[],"lastnames":["Ning"],"firstnames":["Peng"],"suffixes":[]}],"year":"2009","keywords":"malware protection, rootkits, virtual machines","pages":"545--554","bibtex":"@inproceedings{wang_countering_2009,\n\ttitle = {Countering kernel rootkits with lightweight hook protection},\n\turl = {http://doi.acm.org/10.1145/1653662.1653728},\n\turldate = {2012-01-28TZ},\n\tbooktitle = {Proc. of the 16th {ACM} {Conf}. on {Computer} and {Commun}. {Security}},\n\tauthor = {Wang, Zhi and Jiang, Xuxian and Cui, Weidong and Ning, Peng},\n\tyear = {2009},\n\tkeywords = {malware protection, rootkits, virtual machines},\n\tpages = {545--554}\n}\n\n","author_short":["Wang, Z.","Jiang, X.","Cui, W.","Ning, P."],"key":"wang_countering_2009","id":"wang_countering_2009","bibbaseid":"wang-jiang-cui-ning-counteringkernelrootkitswithlightweighthookprotection-2009","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/1653662.1653728"},"keyword":["malware protection","rootkits","virtual machines"],"downloads":0},"search_terms":["countering","kernel","rootkits","lightweight","hook","protection","wang","jiang","cui","ning"],"keywords":["malware protection","rootkits","virtual machines"],"authorIDs":[],"dataSources":["QiRZ7m7shEMvADZkd"]}