Data-Centric OS Kernel Malware Characterization
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/TIFS.2013.2291964
کلیدواژه(گان): data encapsulation,digital signatures,invasive software,operating system kernels,attack patterns,code-centric approach,data access patterns,data object manipulation,data-centric OS kernel malware characterization architecture,dynamic data object hiding,low level data access behavior modeling,malware attack characterization,malware signatures,real-world kernel rootkits,runtime kernel object mapping system,Data structures,Dynamic scheduling,Kernel,Malware,Monitoring,Resource ma
کالکشن
:
-
آمار بازدید
Data-Centric OS Kernel Malware Characterization
Show full item record
| contributor author | Junghwan Rhee | |
| contributor author | Riley, Ryan | |
| contributor author | Zhiqiang Lin | |
| contributor author | Xuxian Jiang | |
| contributor author | Dongyan Xu | |
| date accessioned | 2020-03-12T18:33:32Z | |
| date available | 2020-03-12T18:33:32Z | |
| date issued | 2014 | |
| identifier issn | 1556-6013 | |
| identifier other | 6671356.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/962491 | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Data-Centric OS Kernel Malware Characterization | |
| type | Journal Paper | |
| contenttype | Metadata Only | |
| identifier padid | 7995507 | |
| subject keywords | data encapsulation | |
| subject keywords | digital signatures | |
| subject keywords | invasive software | |
| subject keywords | operating system kernels | |
| subject keywords | attack patterns | |
| subject keywords | code-centric approach | |
| subject keywords | data access patterns | |
| subject keywords | data object manipulation | |
| subject keywords | data-centric OS kernel malware characterization architecture | |
| subject keywords | dynamic data object hiding | |
| subject keywords | low level data access behavior modeling | |
| subject keywords | malware attack characterization | |
| subject keywords | malware signatures | |
| subject keywords | real-world kernel rootkits | |
| subject keywords | runtime kernel object mapping system | |
| subject keywords | Data structures | |
| subject keywords | Dynamic scheduling | |
| subject keywords | Kernel | |
| subject keywords | Malware | |
| subject keywords | Monitoring | |
| subject keywords | Resource ma | |
| identifier doi | 10.1109/TIFS.2013.2291964 | |
| journal title | Information Forensics and Security, IEEE Transactions on | |
| journal volume | 9 | |
| journal issue | 1 | |
| filesize | 2717366 | |
| citations | 1 |


