Title |
Speakers |
Conference |
Tags |
Next generation rootkits for ARM based devices |
Thomas Roth
|
hackinparis-2013 - Paris,France |
Android
Rootkits
Exploitation
ARM
TrustZone
|
Destructive D-Trace - With Great Power Comes Great Responsibility |
Nemo
|
Infiltrate-2013 - Miami, USA |
Rootkits
Dtrace
|
Persistent VGA Rootkit |
Nicolas Economou
,
Diego Juarez
|
ekoparty-2012 - Buenos Aires, Argentina |
Rootkits
Hardware General
Video Card
|
I/O, You own: Regaining control of your disk in the presence of bootkits |
Aaron Lemasters
|
SysCan-2012 - Singapore |
Rootkits
Windows 7
|
ACPI 5.0 Rootkit Attacks Againts Windows 8 |
Alex Ionescu
|
SysCan-2012 - Singapore |
Rootkits
Windows 8
ACPI
|
De Mysteriis Dom Jobsivs |
Loukas
|
SysCan-2012 - Singapore |
Rootkits
EFI
Mac OS
|
Building Custom Disassemblers |
Felix ( FX ) Lindner
|
Berlinsides-2010 - Berlin, Germany |
Rootkits
Reverse Engineering
|
Rootkits And Trojans On Your Sap Landscape |
Ertunga Arsal
,
Ertunga Arsal
|
Chaos Communication Congress-27 - Berlin, Germany |
Security
Rootkits
|
Playing The Shell Game: Non-Root-Kits |
Metlstorm
|
KiwiCon-2010 - Wellington, New Zealand |
Security
Rootkits
|
Rootkits In The Real World Today |
Antti Tikkanen
,
Kimmo Kasslin
|
hashdays-2010 - Lucerne, Switzerland |
Rootkits
|
Iphone Hackery |
Ross Simpson
|
ZaCon-2 - Johannesburg, South Africa |
Mobile Security
Security
Rootkits
|
Having Fun With Apples Iokit |
Ilja Van sprundel
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Mobile Security
Rootkits
|
Managed Code Rootkits Ñ Hooking Into Runtime Environments |
Erez Metula
|
SOURCE Boston-2010 - Boston, USA |
Security
Rootkits
|
State Of Malware: Family Ties |
Peter Carrera
|
Blackhat Europe-2010 - Barcelona, Spain |
Security
Rootkits
Malware
Development
|
Prospecting For Rootite: More Code Coverage, More Bugs, Less Wasted Effort |
Ben Nagy
|
Ruxcon-2010 - Melbourne, Austrailia |
Rootkits
|
Malicious Developers And Enterprise Java Rootkits |
Jeff Williams
|
OWASP Appsec-2009 - Washington DC, USA |
Security
Rootkits
Development
|
Rootkits For Javascript Environments |
Collin Jackson
,
Adam Barth
,
Ben Adida
|
3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada |
Security
Rootkits
|
Call-In: A 16 Bit Rootkit And Second Generation Zigbee Chips |
Travis Goodspeed
|
NinjaCon-2009 - Vienna, Austria |
Security
Rootkits
Hardware Reverse Engineering
Hardware General
|
Managed Code Rootkits - Hooking Into Runtime Environments |
Erez Metula
|
DEF CON-17 - Las Vegas, USA |
Security
Rootkits
|
Enterprise Java Rootkits |
Jeff Williams
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Rootkits
|
Introducing Ring -3 Rootkits |
Rafal Wojtczuk
,
Alexander Tereshkin
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Rootkits
|
Advanced Mac Os X Rootkits |
Dino Dai Zovi
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Rootkits
|
Outspect: Live Memory Forensic And Incident Response For Virtual Machine |
Nguyen Anh Quynh
|
SyScan-2009 - Singapore |
Security
Rootkits
Exploitation
Malware
|
Mac Os Xploitation |
Dino Dai Zovi
|
HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia |
Security
Rootkits
Wireless
Exploitation
Testing
|
Developing a Mac OS X kernel based rootkit |
Torbj\xc3\xb6rn Pettersson
|
SEC-T-2008 - Stockholm, Sweden |
Security
Rootkits
|
Irk - Crafting Os X Kernel Rootkits |
Jesse "x30n" D'aguanno
|
Blackhat USA-2008 - Las Vegas, USA |
Security
Rootkits
|
Windows Mobile Rootkit - Updated |
Petr Matousek
|
SyScan-2008 - Singapore |
Security
Rootkits
Monitoring
|
Rootkits 101 |
Txs
|
CarolinaCon-4 - Raleigh, USA |
Security
Rootkits
|
Advanced Rootkits |
Greg Hoglund
|
16th USENIX Security Symposium-2007 - Boston, USA |
Security
Rootkits
|
Don'T Tell Joanna, The Virtualized Rootkit Is Dead |
Thomas Ptacek
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Rootkits
|
Software Virtualization Based Rootkits |
Sun Bing
|
Blackhat Europe-2007 - Amsterdam, The Netherlands |
Security
Rootkits
|
Rootkits As Reversing Tools |
Alan Bradley
|
Chaos Communication Congress-23 - Berlin, Germany |
Security
Rootkits
|
Oracle Rootkits 2.0 |
Alexander Kornbrust
|
DEF CON-14 - Las Vegas, USA |
Security
Rootkits
|
Ghosts (And Zombies) In The Machine |
Brad Johnson
|
HOPE Number 6-2006 - USA |
Security
Rootkits
Web
|
Oracle Rootkits And Oracle Viruses |
Alexander Kornbrust
|
SyScan-2006 - Singapore |
Security
Rootkits
|
Unpacking Malware, Trojans And Worms |
Paul Craig
|
SyScan-2006 - Singapore |
Security
Rootkits
Mail
|
Alter Wein In Einer Neuen Flasche: Rootkits Unter Dem 2.6 Kernel |
Newroot
,
K-mode
|
Chaos Communication Congress-22 - Berlin, Germany |
Security
Rootkits
|
Profiling Rootkits And Malware Through Executive Objects |
Matthew ( Shok ) Conover
|
SyScan-2005 - Singapore |
Security
Rootkits
Malware
|
Eeye Bootroot |
Ryan Permeh
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Rootkits
|
Database Rootkits |
Alexander Kornbrust
|
Blackhat Europe-2005 - Amsterdam, The Netherlands |
Security
Rootkits
|
Sun Bloody Daft Solaris Mechanisms |
Archim
|
Chaos Communication Congress-21 - Berlin, Germany |
Security
Rootkits
|
Exploiting Software (Pdf) |
Gary Mcgraw
|
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
Rootkits
|
Dkom (Direct Kernel Object Manipulation) |
Jamie Butler
|
Blackhat Europe-2004 - Amsterdam, The Netherlands |
Security
Rootkits
Access
|
Defeating Kernel Native Api Hookers |
Chew KEONG Tan
|
HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia |
Security
Rootkits
|