Jonas Pfoh

According to our database1, Jonas Pfoh authored at least 9 papers between 2009 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Persistent Data-only Malware: Function Hooks without Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Leveraging derivative virtual machine introspection methods for security applications.
PhD thesis, 2013

Leveraging String Kernels for Malware Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

2011
Nitro: Hardware-Based System Call Tracing for Virtual Machines.
Proceedings of the Advances in Information and Computer Security, 2011

A Universal Semantic Bridge for Virtual Machine Introspection.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
Exploiting the x86 Architecture to Derive Virtual Machine State Information.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2009
A formal model for virtual machine introspection.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009


  Loading...