3.8 Proceedings Paper

A Review on Learning-based Detection Approaches of the Kernel-level Rootkit

Related references

Note: Only part of the references are listed.
Review Computer Science, Hardware & Architecture

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers

Wonjun Lee et al.

2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020) (2020)

Article Computer Science, Hardware & Architecture

KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object

Hojoon Lee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Mathematical & Computational Biology

TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis

Xiao Wang et al.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2019)

Article Computer Science, Information Systems

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning

Donghai Tian et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Early-stage malware prediction using recurrent neural networks

Matilda Rhode et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

Ethan M. Rudd et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Proceedings Paper Computer Science, Information Systems

Adversarial Examples for Malware Detection

Kathrin Grosse et al.

COMPUTER SECURITY - ESORICS 2017, PT II (2017)

Proceedings Paper Computer Science, Information Systems

Kernel Malware Core Implementation: A Survey

Li XiangYu et al.

2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (2015)

Article Computer Science, Theory & Methods

Back to Static Analysis for Kernel-Level Rootkit Detection

Seyyedeh Atefeh Musavi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)