This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
livedm [2010/09/20 10:25] dxu |
livedm [2010/09/20 10:27] dxu |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== LiveDM: Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory ====== | + | ====== Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory ====== |
Dynamic kernel memory has been a popular target of recent kernel | Dynamic kernel memory has been a popular target of recent kernel | ||
malware due to the difficulty of determining the status of volatile dynamic kernel | malware due to the difficulty of determining the status of volatile dynamic kernel | ||
Line 22: | Line 22: | ||
a reliable analysis of such behavior by guiding the inspection only to the | a reliable analysis of such behavior by guiding the inspection only to the | ||
events relevant to the attack. | events relevant to the attack. | ||
+ | |||
===== Publications ===== | ===== Publications ===== | ||
* "Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory". Junghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang. To appear in the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada, September 2010 | * "Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory". Junghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang. To appear in the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada, September 2010 |