HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection:
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Erlangen ; Nürnberg
Friedrich-Alexander-Universität Erlangen-Nürnberg
April 2024
|
Schriftenreihe: | Technical reports / Department Informatik
CS-2024-01 |
Schlagworte: | |
Online-Zugang: | Volltext Volltext Volltext |
Beschreibung: | 1 Online-Ressource |
DOI: | 10.25593/issn.2191-5008/CS-2024-01 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049734065 | ||
003 | DE-604 | ||
006 | a m||| 00||| | ||
007 | cr|uuu---uuuuu | ||
008 | 240607s2024 gw |||| o||u| ||||||eng d | ||
015 | |a 24,O05 |2 dnb | ||
016 | 7 | |a 1326667866 |2 DE-101 | |
024 | 7 | |a 10.25593/issn.2191-5008/CS-2024-01 |2 doi | |
024 | 7 | |a urn:nbn:de:101:1-2404190502416.506049561855 |2 urn | |
035 | |a (OCoLC)1443577270 | ||
035 | |a (DE-599)DNB1326667866 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |8 3\p |a eng | |
044 | |a gw |c XA-DE-BY | ||
049 | |a DE-29 | ||
084 | |8 2\p |a 004 |2 23sdnb | ||
084 | |8 1\p |a 005.43 |2 23ksdnb | ||
100 | 1 | |a Palutke, Ralph |e Verfasser |0 (DE-588)1251570437 |4 aut | |
245 | 1 | 0 | |a HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |c Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling |
264 | 1 | |a Erlangen ; Nürnberg |b Friedrich-Alexander-Universität Erlangen-Nürnberg |c April 2024 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Technical reports / Department Informatik |v CS-2024-01 | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
653 | |a system analysis | ||
653 | |a virtualization | ||
653 | |a DMA | ||
653 | |a PCILeech | ||
653 | |a memory acquisition | ||
653 | |a digital forensics | ||
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
700 | 1 | |a Ruderich, Simon |e Verfasser |4 aut | |
700 | 1 | |a Wild, Matthias |e Verfasser |4 aut | |
700 | 1 | |a Hacker, Jonathan |e Verfasser |4 aut | |
700 | 1 | |a Konrad, Jonas |e Verfasser |4 aut | |
700 | 1 | |a Freiling, Felix |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |
810 | 2 | |a Department Informatik |t Technical reports |v CS-2024-01 |w (DE-604)BV037301114 |9 CS-2024-01 | |
856 | 4 | 0 | |u https://open.fau.de/handle/openfau/30871 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.25593/issn.2191-5008/CS-2024-01 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://d-nb.info/1326667866/34 |x Langzeitarchivierung Nationalbibliothek |z kostenfrei |3 Volltext |
883 | 0 | |8 1\p |a emakn |c 0,22419 |d 20240420 |q DE-101 |u https://d-nb.info/provenance/plan#emakn | |
883 | 0 | |8 2\p |a emasg |c 0,76071 |d 20240420 |q DE-101 |u https://d-nb.info/provenance/plan#emasg | |
883 | 1 | |8 3\p |a npi |d 20240419 |q DE-101 |u https://d-nb.info/provenance/plan#npi | |
912 | |a ebook |
Datensatz im Suchindex
_version_ | 1805083889459265536 |
---|---|
adam_text | |
any_adam_object | |
author | Palutke, Ralph Ruderich, Simon Wild, Matthias Hacker, Jonathan Konrad, Jonas Freiling, Felix |
author_GND | (DE-588)1251570437 |
author_facet | Palutke, Ralph Ruderich, Simon Wild, Matthias Hacker, Jonathan Konrad, Jonas Freiling, Felix |
author_role | aut aut aut aut aut aut |
author_sort | Palutke, Ralph |
author_variant | r p rp s r sr m w mw j h jh j k jk f f ff |
building | Verbundindex |
bvnumber | BV049734065 |
collection | ebook |
ctrlnum | (OCoLC)1443577270 (DE-599)DNB1326667866 |
doi_str_mv | 10.25593/issn.2191-5008/CS-2024-01 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV049734065</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="006">a m||| 00|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240607s2024 gw |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">24,O05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1326667866</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.25593/issn.2191-5008/CS-2024-01</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">urn:nbn:de:101:1-2404190502416.506049561855</subfield><subfield code="2">urn</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1443577270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1326667866</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BY</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">2\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">005.43</subfield><subfield code="2">23ksdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Palutke, Ralph</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1251570437</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection</subfield><subfield code="c">Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Erlangen ; Nürnberg</subfield><subfield code="b">Friedrich-Alexander-Universität Erlangen-Nürnberg</subfield><subfield code="c">April 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Technical reports / Department Informatik</subfield><subfield code="v">CS-2024-01</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">system analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">virtualization</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DMA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">PCILeech</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">memory acquisition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital forensics</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruderich, Simon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wild, Matthias</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hacker, Jonathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Konrad, Jonas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Freiling, Felix</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Department Informatik</subfield><subfield code="t">Technical reports</subfield><subfield code="v">CS-2024-01</subfield><subfield code="w">(DE-604)BV037301114</subfield><subfield code="9">CS-2024-01</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://open.fau.de/handle/openfau/30871</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.25593/issn.2191-5008/CS-2024-01</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://d-nb.info/1326667866/34</subfield><subfield code="x">Langzeitarchivierung Nationalbibliothek</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">emakn</subfield><subfield code="c">0,22419</subfield><subfield code="d">20240420</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#emakn</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">emasg</subfield><subfield code="c">0,76071</subfield><subfield code="d">20240420</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#emasg</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">npi</subfield><subfield code="d">20240419</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#npi</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV049734065 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T07:55:44Z |
institution | BVB |
language | English |
oclc_num | 1443577270 |
open_access_boolean | 1 |
owner | DE-29 |
owner_facet | DE-29 |
physical | 1 Online-Ressource |
psigel | ebook |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Friedrich-Alexander-Universität Erlangen-Nürnberg |
record_format | marc |
series2 | Technical reports / Department Informatik |
spelling | Palutke, Ralph Verfasser (DE-588)1251570437 aut HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling Erlangen ; Nürnberg Friedrich-Alexander-Universität Erlangen-Nürnberg April 2024 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Technical reports / Department Informatik CS-2024-01 Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager system analysis virtualization DMA PCILeech memory acquisition digital forensics (DE-588)4113937-9 Hochschulschrift gnd-content Ruderich, Simon Verfasser aut Wild, Matthias Verfasser aut Hacker, Jonathan Verfasser aut Konrad, Jonas Verfasser aut Freiling, Felix Verfasser aut Erscheint auch als Druck-Ausgabe Department Informatik Technical reports CS-2024-01 (DE-604)BV037301114 CS-2024-01 https://open.fau.de/handle/openfau/30871 Verlag kostenfrei Volltext https://doi.org/10.25593/issn.2191-5008/CS-2024-01 Resolving-System kostenfrei Volltext https://d-nb.info/1326667866/34 Langzeitarchivierung Nationalbibliothek kostenfrei Volltext 1\p emakn 0,22419 20240420 DE-101 https://d-nb.info/provenance/plan#emakn 2\p emasg 0,76071 20240420 DE-101 https://d-nb.info/provenance/plan#emasg 3\p npi 20240419 DE-101 https://d-nb.info/provenance/plan#npi |
spellingShingle | Palutke, Ralph Ruderich, Simon Wild, Matthias Hacker, Jonathan Konrad, Jonas Freiling, Felix HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |
subject_GND | (DE-588)4113937-9 |
title | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |
title_auth | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |
title_exact_search | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |
title_full | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling |
title_fullStr | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling |
title_full_unstemmed | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection Ralph Palutke, Simon Ruderich, Matthias Wild, Jonathan Hacker, Jonas Konrad, Felix Freiling |
title_short | HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection |
title_sort | hyperleech stealthy system analysis with minimal target impact through dma based hypervisor injection |
topic_facet | Hochschulschrift |
url | https://open.fau.de/handle/openfau/30871 https://doi.org/10.25593/issn.2191-5008/CS-2024-01 https://d-nb.info/1326667866/34 |
volume_link | (DE-604)BV037301114 |
work_keys_str_mv | AT palutkeralph hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection AT ruderichsimon hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection AT wildmatthias hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection AT hackerjonathan hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection AT konradjonas hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection AT freilingfelix hyperleechstealthysystemanalysiswithminimaltargetimpactthroughdmabasedhypervisorinjection |