Enforcing kernel constraints by hardware-assisted virtualization Éric LacombeVincent NicometteYves Deswarte Original Paper 21 August 2009 Pages: 1 - 21
Detecting (and creating !) a HVM rootkit (aka BluePill-like) Anthony DesnosÉric FiliolIvan Lefou Original Paper 12 September 2009 Pages: 23 - 49
Removing web spam links from search engine results Manuel EgeleClemens KolbitschChristian Platzer Original Paper 22 August 2009 Pages: 51 - 62
Accuracy improving guidelines for network anomaly detection systems Ayesha Binte AshfaqMuhammad Qasim AliSyed Ali Khayam Original Paper 04 September 2009 Pages: 63 - 81
Stealth malware analysis from kernel space with Kolumbo Julien DesfossezJustine DieppedaleGabriel Girard Original Paper 09 December 2009 Pages: 83 - 93