Login / Signup
Igor Korkin
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 11
Top Topics
Partial Least Squares Regression
Real Time
Kernel Space
Memory Access
Top Venues
CoRR
J. Digit. Forensics Secur. Law
SP Workshops
</>
Publications
</>
Anastasiia Kropova
,
Igor Korkin
ALPC Is In Danger: ALPChecker Detects Spoofing and Blinding.
CoRR
(2024)
Anna Revazova
,
Igor Korkin
RASP for LSASS: Preventing Mimikatz-Related Attacks.
CoRR
(2024)
Denis Pogonin
,
Igor Korkin
Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV.
CoRR
(2022)
Igor Korkin
Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again.
J. Digit. Forensics Secur. Law
16 (1) (2021)
Igor Korkin
Protected Process Light is not Protected: MemoryRanger Fills The Gap Again.
SP Workshops
(2021)
Igor Korkin
Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again.
CoRR
(2021)
Igor Korkin
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel.
CoRR
(2019)
Igor Korkin
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces.
CoRR
(2018)
Igor Korkin
Hypervisor-Based Active Data Protection for Integrity and Confidentiality of Dynamically Allocated Memory in Windows Kernel.
CoRR
(2018)
Igor Korkin
,
Satoshi Tanda
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access.
CoRR
(2017)
Igor Korkin
,
Iwan Nesterow
Acceleration of Statistical Detection of Zero-day Malware in the Memory Dump Using CUDA-enabled GPU Hardware.
CoRR
(2016)
Igor Korkin
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations.
J. Digit. Forensics Secur. Law
10 (2) (2015)
Igor Korkin
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations.
CoRR
(2015)
Igor Korkin
,
Ivan Nesterov
Applying Memory Forensics to Rootkit Detection.
CoRR
(2015)