Example: tourism industry
Detecting kernel rootkits - Dartmouth Computer Science

Detecting kernel rootkits - Dartmouth Computer Science

Back to document page

Detecting kernel rootkits Ashwin Ramaswamy Department of Computer Science Dartmouth College ... Windows rootkits usually utilize the Direct Kernel Object Manipulation (DKOM) ... by our colleagues in attacking networked set-top boxes widely deployed across campus [6]. 4.

  Windows, Detecting, Kernel, Attacking, Rootkit, Detecting kernel rootkits

Download Detecting kernel rootkits - Dartmouth Computer Science

15
Please wait..

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Related search queries