Monthly Archives: September 2015

An initial evaluation of ROP-based JIT-compilation

Return-oriented programming (ROP) is a security exploit technique that allows an attacker to execute code in the presence of security defences. By modifying the contents of the runtime stack, the program control flow can be changed to execute specific machine

Posted in publications

Proactive detection of kernel-mode rootkits

The sophistication of malicious software (malware) used to break the computer security has increased exponentially in the last years. Frequently, malware is hidden into a computer by software components called rootkits. Therefore, early detection of rootkits is of primary importance

Tagged with:
Posted in publications

Rootkits survey: a concealment story

Computer security is an old problem, as old as computers themselves. The evolution of computer threats has also experienced an exponential complexity development, being the last example of that evolution the malware categorized as rootkits or stealth malware. A rootkit

Tagged with:
Posted in publications
In Archive