Login / Signup
Detecting eBPF Rootkits Using Virtualization and Memory Forensics.
Nezer Jacob Zaidenberg
Michael Kiperberg
Eliav Menachi
Asaf Eitani
Published in:
ICISSP (2024)
Keyphrases
</>
operating system
main memory
storage devices
cloud computing
memory requirements
image analysis
memory usage
computing power
memory size
virtual machine
low memory
data management
input output
data storage
digital forensics