Data-Centric OS Kernel Malware Characterization
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/TIFS.2013.2291964
کلیدواژه(گان): data encapsulation,digital signatures,invasive software,operating system kernels,attack patterns,code-centric approach,data access patterns,data object manipulation,data-centric OS kernel malware characterization architecture,dynamic data object hiding,low level data access behavior modeling,malware attack characterization,malware signatures,real-world kernel rootkits,runtime kernel object mapping system,Data structures,Dynamic scheduling,Kernel,Malware,Monitoring,Resource ma
کالکشن
:
-
آمار بازدید
Data-Centric OS Kernel Malware Characterization
Show full item record
contributor author | Junghwan Rhee | |
contributor author | Riley, Ryan | |
contributor author | Zhiqiang Lin | |
contributor author | Xuxian Jiang | |
contributor author | Dongyan Xu | |
date accessioned | 2020-03-12T18:33:32Z | |
date available | 2020-03-12T18:33:32Z | |
date issued | 2014 | |
identifier issn | 1556-6013 | |
identifier other | 6671356.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/962491 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Data-Centric OS Kernel Malware Characterization | |
type | Journal Paper | |
contenttype | Metadata Only | |
identifier padid | 7995507 | |
subject keywords | data encapsulation | |
subject keywords | digital signatures | |
subject keywords | invasive software | |
subject keywords | operating system kernels | |
subject keywords | attack patterns | |
subject keywords | code-centric approach | |
subject keywords | data access patterns | |
subject keywords | data object manipulation | |
subject keywords | data-centric OS kernel malware characterization architecture | |
subject keywords | dynamic data object hiding | |
subject keywords | low level data access behavior modeling | |
subject keywords | malware attack characterization | |
subject keywords | malware signatures | |
subject keywords | real-world kernel rootkits | |
subject keywords | runtime kernel object mapping system | |
subject keywords | Data structures | |
subject keywords | Dynamic scheduling | |
subject keywords | Kernel | |
subject keywords | Malware | |
subject keywords | Monitoring | |
subject keywords | Resource ma | |
identifier doi | 10.1109/TIFS.2013.2291964 | |
journal title | Information Forensics and Security, IEEE Transactions on | |
journal volume | 9 | |
journal issue | 1 | |
filesize | 2717366 | |
citations | 1 |