Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2020
Write-protection enforcement: hypervisor-backed kernel hardening
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 1736–1744https://doi.org/10.1145/3341105.3373919A rootkit is a piece of code that aims to manipulate the computer behaviour without being detected. Rootkits are mainly used to disable kernel self-protection, hide malware presence, provide a covert communication channel between malware and their ...
- research-articleOctober 2016
The Amount of Write-Once-Read-Many Data in an Operating System
RACS '16: Proceedings of the International Conference on Research in Adaptive and Convergent SystemsPages 187–192https://doi.org/10.1145/2987386.2987396As a result of the rapid growth in popularity of portable digital devices in recent years, the power requirements for computer operating systems used in these devices have also rapidly increased as both their complexity and processing power have ...