Sciweavers

66 search results - page 14 / 14
» An Access Control System with Time-constraint Using Support ...
Sort
View
CCS
2009
ACM
13 years 11 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning