Login / Signup

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.

John G. LevineJulian B. GrizzardHenry L. Owen
Published in: IWIA (2004)
Keyphrases