{"title":"Enforcing kernel constraints by hardware-assisted virtualization","authors":"Éric Lacombe, V. Nicomette, Y. Deswarte","doi":"10.1007/s11416-009-0129-1","DOIUrl":"https://doi.org/10.1007/s11416-009-0129-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134484472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stealth malware analysis from kernel space with Kolumbo","authors":"J. Desfossez, Justine Dieppedale, Gabriel Girard","doi":"10.1007/s11416-009-0139-z","DOIUrl":"https://doi.org/10.1007/s11416-009-0139-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting (and creating !) a HVM rootkit (aka BluePill-like)","authors":"Anthony Desnos, E. Filiol, Ivan Lefou","doi":"10.1007/s11416-009-0130-8","DOIUrl":"https://doi.org/10.1007/s11416-009-0130-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Trojan applets in a smart card","authors":"Julien Iguchi-Cartigny, Jean-Louis Lanet","doi":"10.1007/s11416-009-0135-3","DOIUrl":"https://doi.org/10.1007/s11416-009-0135-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Duflot, Olivier Grumelard, O. Levillain, B. Morin
{"title":"ACPI and SMI handlers: some limits to trusted computing","authors":"L. Duflot, Olivier Grumelard, O. Levillain, B. Morin","doi":"10.1007/s11416-009-0138-0","DOIUrl":"https://doi.org/10.1007/s11416-009-0138-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133262358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical overview of a Xen covert channel","authors":"M. Salaün","doi":"10.1007/s11416-009-0131-7","DOIUrl":"https://doi.org/10.1007/s11416-009-0131-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware classification based on call graph clustering","authors":"Joris Kinable, Orestis Kostakis","doi":"10.1007/s11416-011-0151-y","DOIUrl":"https://doi.org/10.1007/s11416-011-0151-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Shabtai, Yuval Fledel, Y. Elovici, Yuval Shahar
{"title":"Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics","authors":"A. Shabtai, Yuval Fledel, Y. Elovici, Yuval Shahar","doi":"10.1007/s11416-009-0125-5","DOIUrl":"https://doi.org/10.1007/s11416-009-0125-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}