Information security and particularly stealth malware research is not only a job, but also hobby and lifestyle. Interested in finding implicit relationships in complex tasks. Currently integrating concepts developed in Ph.D. thesis into the Malware Analysis System for Hidden Knotty Anomalies detecting stealth malware on the operating system and hypervisor levels.
Search This Blog
May 27, 2012
The Rootkit Arsenal 2nd Edition pdf
Takedown Notice; Cease and Desist; Copyright Infringement pdf