|
- 1
-
Conover, Matt. Malware Profiling and Rootkit Detection on
Windows.
http://xcon.xfocus.org/archives/2005/Xcon2005_Shok.pdf;
accessed Dec. 12, 2005.
- 2
-
eEye Digital Security. Remote Windows Kernel Exploitation:
Step into the Ring 0.
http://www.eeye.com/~data/publish/whitepapers/research/OT20050205.FILE.pdf;
accessed Dec. 8, 2005.
- 3
-
skape. Safely Searching Process Virtual Address Space.
http://www.hick.org/code/skape/papers/egghunt-shellcode.pdf;
accessed Dec. 12, 2005.
- 4
-
SoBeIt. How to Exploit Windows Kernel Memory Pool.
http://packetstormsecurity.nl/Xcon2005/Xcon2005_SoBeIt.pdf;
accessed Dec. 11, 2005.
- 5
-
System Inside. Sysenter.
http://system-inside.com/driver/sysenter/sysenter.html;
accessed Nov. 23, 2005.
|