Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
Recent rootkit-attack mitigation work neglected to address the integrity of the mitigation tool itself. Both detection and prevention arms of current rootkit-attack mitigation solutions can be given credit for the advancement of multiple methodologies for rootkit defense but if the defense system it...
| Main Authors: | Yew, Teh Jia, Samsudin, Khairulmizam, Udzir, Nur Izura, Hashim, Shaiful Jahari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Putra Malaysia
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30621/ http://psasir.upm.edu.my/id/eprint/30621/1/Rootkit%20Guard%20%28RG%29%20-%20An%20Architecture%20for%20Rootkit%20Resistant%20File-System%20Implementation%20Based%20on%20TPM.pdf |
Similar Items
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Theoretical study of Si+(2PJ)-RG complexes and transport of Si+(2PJ) in RG (RG = He – Ar)
by: Tuttle, William D., et al.
Published: (2017)
by: Tuttle, William D., et al.
Published: (2017)
Theoretical study of M+ RG2: (M+= Ca, Sr, Ba and Ra; RG= He–Rn)
by: Andrejeva, Anna, et al.
Published: (2015)
by: Andrejeva, Anna, et al.
Published: (2015)
Virtual guard
by: Mohamad Faiz, Mohd Ali
Published: (2010)
by: Mohamad Faiz, Mohd Ali
Published: (2010)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Interaction of the NO 3pπ (C 2Π) Rydberg state with RG (RG = Ne, Kr, and Xe): potential energy surfaces and spectroscopy
by: Ershova, Olga V., et al.
Published: (2015)
by: Ershova, Olga V., et al.
Published: (2015)
Cage effect in the dissociation of van der Waals complexes RgI2 (Rg=Ar, Kr, Xe): A quasiclassical trajectory study
by: Ibrahim Ali , Noorbatcha
Published: (1984)
by: Ibrahim Ali , Noorbatcha
Published: (1984)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
In vitro study of postbiotics from Lactobacillus plantarum RG14 on rumen fermentation and microbial population
by: Wan Ibrahim, Izuddin, et al.
Published: (2018)
by: Wan Ibrahim, Izuddin, et al.
Published: (2018)
The successful implementation of TPM in conjunction with EOM and 5S: a case presentation
by: Ahmed, Shamsuddin, et al.
Published: (2005)
by: Ahmed, Shamsuddin, et al.
Published: (2005)
Intelligent shoe guard system
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Water is life, guard it well
by: Abd Razak, Dzulkifli
Published: (2008)
by: Abd Razak, Dzulkifli
Published: (2008)
Automatic home guarding system
by: Lim, Kheng Hee, et al.
Published: (2016)
by: Lim, Kheng Hee, et al.
Published: (2016)
Security guard monitoring system
by: Lee, Jie Lun
Published: (2024)
by: Lee, Jie Lun
Published: (2024)
Don’t drop your guard
by: Tang, Ashley
Published: (2021)
by: Tang, Ashley
Published: (2021)
Jawatan TPM imbangi parti
by: Utusan Malaysia
Published: (2021)
by: Utusan Malaysia
Published: (2021)
The Effectiveness Of Total Productive Maintenance (TPM) Implementation In Samsung SDI (M) Berhad
by: Loong, Lim Kim
Published: (2002)
by: Loong, Lim Kim
Published: (2002)
Barriers to Successful Implementation of Total Productive Maintenance (TPM) and Ways to Overcome Them
by: Guimaraes, Helder
Published: (2004)
by: Guimaraes, Helder
Published: (2004)
Experimental verification of lift enhancement of laminar flow airfoil RG15 in low Reynolds number boundary layers
by: Ariff, Omar Kassim, et al.
Published: (2015)
by: Ariff, Omar Kassim, et al.
Published: (2015)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
A surprisingly simple electrostatic model explains bent vs. linear structures in M+-RG2 species (M = group 1 metal, Li–Fr; RG = rare gas, He–Rn)
by: Andrejeva, Anna, et al.
Published: (2015)
by: Andrejeva, Anna, et al.
Published: (2015)
Evaluating 8 pillars of Total Productive Maintenance (TPM) implementation and their contribution to manufacturing performance
by: Adesta, Erry Yulian Triblas, et al.
Published: (2018)
by: Adesta, Erry Yulian Triblas, et al.
Published: (2018)
Graduan perluk anjakan paradigma - TPM
Published: (2008)
Published: (2008)
Mini MAHA fokus sektor : TPM
Published: (2011)
Published: (2011)
TPM bentang hasil forensik banjir
by: Ishak, Zulhisham
Published: (2015)
by: Ishak, Zulhisham
Published: (2015)
'Muhyiddin calon sesuai sebagai TPM'
by: Sinar Harian, .
Published: (2020)
by: Sinar Harian, .
Published: (2020)
Influence of postbiotic RG14 and inulin combination on cecal microbiota, organic acid concentration, and cytokine expression in broiler chickens
by: Kareem, Karwan Yaseen, et al.
Published: (2017)
by: Kareem, Karwan Yaseen, et al.
Published: (2017)
Pak guard bangga genggam segulung ijazah
by: Utusan Malaysia
Published: (2017)
by: Utusan Malaysia
Published: (2017)
Student lodges report against UPM guards
by: The Sun, Kong See Hoh
Published: (2007)
by: The Sun, Kong See Hoh
Published: (2007)
Mall Guards Catch Group Of Shoplifting Students
by: The Star,
Published: (2008)
by: The Star,
Published: (2008)
Be vigilant and guard against complacency, say experts
by: The Star
Published: (2021)
by: The Star
Published: (2021)
Total productive maintenance (TPM) implementation based on lean manufacturing tools in Indonesian manufacturing industries
by: Adesta, Erry Yulian Triblas, et al.
Published: (2018)
by: Adesta, Erry Yulian Triblas, et al.
Published: (2018)
Productivity Breakthrough With TPM : A Case Study
by: Khai Huat, Jeffrey Low
Published: (2003)
by: Khai Huat, Jeffrey Low
Published: (2003)
Islam selamat, TPM Cina bukan isu
by: Bari, Abdul Aziz
Published: (2010)
by: Bari, Abdul Aziz
Published: (2010)
Syor wujud jawatan TPM redakan polemik
by: Berita Harian
Published: (2020)
by: Berita Harian
Published: (2020)
Improvement of Overall Equipment Effectiveness (OEE) through Implementation of Total Productive Maintenance (TPM) in Manufacturing Industries
by: A. R., Razali, et al.
Published: (2015)
by: A. R., Razali, et al.
Published: (2015)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Similar Items
-
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014) -
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Theoretical study of Si+(2PJ)-RG complexes and transport of Si+(2PJ) in RG (RG = He – Ar)
by: Tuttle, William D., et al.
Published: (2017) -
Theoretical study of M+ RG2: (M+= Ca, Sr, Ba and Ra; RG= He–Rn)
by: Andrejeva, Anna, et al.
Published: (2015)