共 33 条
- [1] Akao Y., 2016, 2016 INT C INF SCI S, P1, DOI DOI 10.1109/ICISSEC.2016.7885860
- [2] Al-Shaheri S., 2013, ANN ADFSL C DIG FOR, V4
- [3] Automatic Inference and Enforcement of Kernel Data Structure Invariants [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 77 - 86
- [4] Blunden B., 2012, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
- [6] Dolan-Gavitt B, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P566
- [7] JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 65 - 73
- [8] Han S., 2017, BLACKHAT ASIA
- [9] Hay Brian, 2008, Operating Systems Review, V42, P74, DOI 10.1145/1368506.1368517
- [10] Hofmann O. S., 2011, ASPLOS