Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps

Author(s):  
Thomas Barabosch ◽  
Niklas Bergmann ◽  
Adrian Dombeck ◽  
Elmar Padilla
IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 77829-77840 ◽  
Author(s):  
Hussein Alnabulsi ◽  
Rafiqul Islam ◽  
Majharul Talukder

2010 ◽  
Vol 7 (4) ◽  
pp. 351-365 ◽  
Author(s):  
Ryan Riley ◽  
Xuxian Jiang ◽  
Dongyan Xu

2012 ◽  
Vol E95.B (5) ◽  
pp. 1711-1721 ◽  
Author(s):  
YoungHan CHOI ◽  
HyoungChun KIM ◽  
DongHoon LEE

2011 ◽  
Vol 8 (4) ◽  
pp. 588-601 ◽  
Author(s):  
B Salamat ◽  
T Jackson ◽  
G Wagner ◽  
C Wimmer ◽  
M Franz

Author(s):  
Elena Gabriela Barrantes ◽  
David H. Ackley ◽  
Trek S. Palmer ◽  
Darko Stefanovic ◽  
Dino Dai Zovi

Sign in / Sign up

Export Citation Format

Share Document