Uninformed: Informative Information for the Uninformed

Vol 7» 2007.May


Bibliography

1
AMD. AMD64 Architecture Programmer's Manual: Volume 2 System Programming.

http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/24593.pdf; accessed 5/2/2007.

2
Amini, Pedram. PaiMei.

http://pedram.redhive.com/PaiMei/docs/; accessed 5/10/2007.

3
Bala, Duesterwald, Banerija. Transparent Dynamic Optimization.

http://www.hpl.hp.com/techreports/1999/HPL-1999-77.pdf; accessed 5/2/2007.

4
Hewlett-Packard, MIT. DynamoRIO.

http://www.cag.lcs.mit.edu/dynamorio/; accessed 4/30/2007.

5
Horovitz, Oded. Memory Access Detection.

http://cansecwest.com/core03/mad.zip; accessed 5/7/2007.

6
Intel. Intel Architecture Software Developer's Manual Volume 3: System Programming.

http://download.intel.com/design/PentiumII/manuals/24319202.pdf; accessed 5/1/2007.

7
Microsoft Corporation. GetWriteWatch.

http://msdn2.microsoft.com/en-us/library/aa366573.aspx; accessed 5/5/2007.

8
Nethercote, Nicholas. Dynamic Binary Analysis and Instrumentation.

http://valgrind.org/docs/phd2004.pdf; accessed 5/2/2007.

9
PaX Team. PAGEEXEC.

http://pax.grsecurity.net/docs/pageexec.txt; accessed 5/1/2007.

10
Sparks, Butler. Shadow Walker: Raising the Bar for Rootkit Detection.

https://www.blackhat.com/presentations/bh-jp-05/bh-jp-05-sparks-butler.pdf; accessed 5/3/2007.

11
Stewart, Joe. Ollybone.

http://www.joestewart.org/ollybone/; accessed 5/3/2007.

12
Valgrind. Valgrind.

http://valgrind.org/; accessed 4/30/2007.