Skip to main content
Top

Journal of Computer Virology and Hacking Techniques

Issue 1/2011

Content (5 Articles)

Original Paper

Enforcing kernel constraints by hardware-assisted virtualization

Éric Lacombe, Vincent Nicomette, Yves Deswarte

Original Paper

Detecting (and creating !) a HVM rootkit (aka BluePill-like)

Anthony Desnos, Éric Filiol, Ivan Lefou

Original Paper

Removing web spam links from search engine results

Manuel Egele, Clemens Kolbitsch, Christian Platzer

Original Paper

Accuracy improving guidelines for network anomaly detection systems

Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam

Original Paper

Stealth malware analysis from kernel space with Kolumbo

Julien Desfossez, Justine Dieppedale, Gabriel Girard

Current Publications

scroll for more

use your arrow keys for more

scroll or use arrow keys for more

Premium Partner