Sciweavers

57 search results - page 1 / 12
» Robust signatures for kernel data structures
Sort
View
CCS
2009
ACM
13 years 11 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
13 years 11 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
DIMVA
2009
13 years 5 months ago
Polymorphing Software by Randomizing Data Structure Layout
Abstract. This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts f...
Zhiqiang Lin, Ryan Riley, Dongyan Xu
ICIP
1999
IEEE
14 years 6 months ago
Data Hiding in Video
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables high rate of da...
Jong Jin Chae, B. S. Manjunath
BMCBI
2008
85views more  BMCBI 2008»
13 years 4 months ago
Merging microarray data from separate breast cancer studies provides a robust prognostic test
Background: There is an urgent need for new prognostic markers of breast cancer metastases to ensure that newly diagnosed patients receive appropriate therapy. Recent studies have...
Lei Xu, Aik Choon Tan, Raimond L. Winslow, Donald ...