Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Gdb documentation (2011), http://www.gnu.org/software/gdb/documentation/
2. Arthur, C.: More than 50 android apps found infected with rootkit malware. Guardian Technology Blog (2011), http://www.guardian.co.uk/technology/blog/2011/mar/02/android-market-apps-malware
3. Baliga, A., Ganapathy, V., Iftode, L.: Detecting kernel-level rootkits using data structure invariants. IEEE Transactions on Dependable and Secure Computing 99(PrePrints) (2010)
4. Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., Iftode, L.: Rootkits on smart phones: attacks, implications and opportunities. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 49–54. ACM, New York (2010)
5. Bunten, A.: Unix and linux based rootkits techniques and countermeasures (2004)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ensuring Kernel Integrity Using KIPBMFH;Information and Communications Security;2016