Dear All, I will need to hear from you about your project topic by the end of this week. 1. I posted the notes from today in the class directory, as rootkit-notes.txt . You will find the materials in the rootkits/ subdirectory and more at http://althing.cs.dartmouth.edu/secref/resources/kernel/rootkits/ 2. The slides for Jacob Torrey's and Rob Graham's guest lectures have been posted. Use any and all in these as inspiration for your projects! Sophia D'Antoine's thesis: www.sophia.re/SC/thesis.pdf Runnable code: www.sophia.re/SC/ ; slides: http://www.sophia.re/SC/RECON_2015_OoOE.pdf Papers mentioned in class: NoHype: Virtualized Cloud Infrastructure without the Virtualization: https://www.cs.princeton.edu/~jrex/papers/isca10.pdf TRESOR Runs Encryption Securely Outside RAM https://www.usenix.org/legacy/event/sec11/tech/full_papers/Muller.pdf Good intro to cross-VM attacks: http://blog.cryptographyengineering.com/2012/10/attack-of-week-cross-vm-timing-attacks.html Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds https://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf Cross-VM Side Channels and Their Use to Extract Private Keys https://www.cs.unc.edu/~reiter/papers/2012/CCS.pdf AES-NI instruction trapping: In https://www.alchemistowl.org/pocorgtfo/pocorgtfo07.pdf Thanks, --Sergey