Journal in Computer Virology最新文献

筛选
英文 中文
Enforcing kernel constraints by hardware-assisted virtualization 通过硬件辅助的虚拟化来实施内核约束
Journal in Computer Virology Pub Date : 2011-02-01 DOI: 10.1007/s11416-009-0129-1
Éric Lacombe, V. Nicomette, Y. Deswarte
{"title":"Enforcing kernel constraints by hardware-assisted virtualization","authors":"Éric Lacombe, V. Nicomette, Y. Deswarte","doi":"10.1007/s11416-009-0129-1","DOIUrl":"https://doi.org/10.1007/s11416-009-0129-1","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134484472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Stealth malware analysis from kernel space with Kolumbo 用Kolumbo从内核空间进行隐形恶意软件分析
Journal in Computer Virology Pub Date : 2011-02-01 DOI: 10.1007/s11416-009-0139-z
J. Desfossez, Justine Dieppedale, Gabriel Girard
{"title":"Stealth malware analysis from kernel space with Kolumbo","authors":"J. Desfossez, Justine Dieppedale, Gabriel Girard","doi":"10.1007/s11416-009-0139-z","DOIUrl":"https://doi.org/10.1007/s11416-009-0139-z","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting (and creating !) a HVM rootkit (aka BluePill-like) 检测(并创建!)一个HVM rootkit(又名BluePill-like)
Journal in Computer Virology Pub Date : 2011-02-01 DOI: 10.1007/s11416-009-0130-8
Anthony Desnos, E. Filiol, Ivan Lefou
{"title":"Detecting (and creating !) a HVM rootkit (aka BluePill-like)","authors":"Anthony Desnos, E. Filiol, Ivan Lefou","doi":"10.1007/s11416-009-0130-8","DOIUrl":"https://doi.org/10.1007/s11416-009-0130-8","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Malicious origami in PDF 恶意折纸PDF
Journal in Computer Virology Pub Date : 2010-11-01 DOI: 10.1007/s11416-009-0128-2
F. Raynal, Guillaume Delugré, Damien Aumaitre
{"title":"Malicious origami in PDF","authors":"F. Raynal, Guillaume Delugré, Damien Aumaitre","doi":"10.1007/s11416-009-0128-2","DOIUrl":"https://doi.org/10.1007/s11416-009-0128-2","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Developing a Trojan applets in a smart card 在智能卡中开发木马小程序
Journal in Computer Virology Pub Date : 2010-11-01 DOI: 10.1007/s11416-009-0135-3
Julien Iguchi-Cartigny, Jean-Louis Lanet
{"title":"Developing a Trojan applets in a smart card","authors":"Julien Iguchi-Cartigny, Jean-Louis Lanet","doi":"10.1007/s11416-009-0135-3","DOIUrl":"https://doi.org/10.1007/s11416-009-0135-3","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
ACPI and SMI handlers: some limits to trusted computing ACPI和SMI处理程序:可信计算的一些限制
Journal in Computer Virology Pub Date : 2010-11-01 DOI: 10.1007/s11416-009-0138-0
L. Duflot, Olivier Grumelard, O. Levillain, B. Morin
{"title":"ACPI and SMI handlers: some limits to trusted computing","authors":"L. Duflot, Olivier Grumelard, O. Levillain, B. Morin","doi":"10.1007/s11416-009-0138-0","DOIUrl":"https://doi.org/10.1007/s11416-009-0138-0","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133262358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Practical overview of a Xen covert channel Xen隐蔽信道的实用概述
Journal in Computer Virology Pub Date : 2010-11-01 DOI: 10.1007/s11416-009-0131-7
M. Salaün
{"title":"Practical overview of a Xen covert channel","authors":"M. Salaün","doi":"10.1007/s11416-009-0131-7","DOIUrl":"https://doi.org/10.1007/s11416-009-0131-7","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
IpMorph: fingerprinting spoofing unification IpMorph:指纹欺骗统一
Journal in Computer Virology Pub Date : 2010-11-01 DOI: 10.1007/s11416-009-0134-4
Guillaume Prigent, Florian Vichot, Fabrice Harrouet
{"title":"IpMorph: fingerprinting spoofing unification","authors":"Guillaume Prigent, Florian Vichot, Fabrice Harrouet","doi":"10.1007/s11416-009-0134-4","DOIUrl":"https://doi.org/10.1007/s11416-009-0134-4","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Malware classification based on call graph clustering 基于呼叫图聚类的恶意软件分类
Journal in Computer Virology Pub Date : 2010-08-25 DOI: 10.1007/s11416-011-0151-y
Joris Kinable, Orestis Kostakis
{"title":"Malware classification based on call graph clustering","authors":"Joris Kinable, Orestis Kostakis","doi":"10.1007/s11416-011-0151-y","DOIUrl":"https://doi.org/10.1007/s11416-011-0151-y","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 197
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics 使用KBTA方法从带时间戳的原始系统度量中推断计算机和网络安全警报
Journal in Computer Virology Pub Date : 2010-08-01 DOI: 10.1007/s11416-009-0125-5
A. Shabtai, Yuval Fledel, Y. Elovici, Yuval Shahar
{"title":"Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics","authors":"A. Shabtai, Yuval Fledel, Y. Elovici, Yuval Shahar","doi":"10.1007/s11416-009-0125-5","DOIUrl":"https://doi.org/10.1007/s11416-009-0125-5","url":null,"abstract":"","PeriodicalId":299744,"journal":{"name":"Journal in Computer Virology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信