The authors are malware researchers at ESET. This paper deals with: evolution of payloads and rootkits, bypassing code integrity checks, attacking Windows Bootloader, modern bootkit details (Win64/Olmarik and Win64/Rovnix), debugging bootkit with Bochs emulator and HiddenFsReader.
Opt-Out Signal HonoredOpt-Out Honored Your Opt-Out Signal is active and being honored by this site.