메뉴 건너뛰기




Volumn , Issue , 2007, Pages 246-251

Lurking in the shadows: Identifying systemic threats to kernel data (short paper)

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SYSTEMS; DATA STRUCTURES; KNOWLEDGE ENGINEERING; SOFTWARE PROTOTYPING;

EID: 34548708575     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.25     Document Type: Conference Paper
Times cited : (64)

References (18)
  • 2
    • 34548741648 scopus 로고    scopus 로고
    • The marsaglia random number cdrom including the diehard battery of tests of randomness. G Marsaglia - See http://stat.fsu.edu/pub/diehard, 1996.
    • The marsaglia random number cdrom including the diehard battery of tests of randomness. G Marsaglia - See http://stat.fsu.edu/pub/diehard, 1996.
  • 7
    • 85084162914 scopus 로고    scopus 로고
    • N. L. P. Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium, 2004.
    • N. L. P. Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium, 2004.
  • 8
    • 84991799247 scopus 로고    scopus 로고
    • N. L. P. Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
    • N. L. P. Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
  • 9
    • 85028170979 scopus 로고    scopus 로고
    • R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. 12th USENIX Security Symposium, Washington DC, 09 2003.
    • R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. 12th USENIX Security Symposium, Washington DC, 09 2003.
  • 12
    • 34548713267 scopus 로고    scopus 로고
    • C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on tcp. sp, 00:0208, 1997.
    • C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on tcp. sp, 00:0208, 1997.
  • 13
    • 33845427178 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. K. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP, pages 1-16, 2005.
    • (2005) SOSP , pp. 1-16
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doom, L.5    Khosla, P.K.6
  • 14
    • 3042738543 scopus 로고    scopus 로고
    • A. Seshadri, A. Perrig, L. van Doom, and P. Khosla. Swatt: Software-based attestation for embedded devices. sp, 00:272, 2004.
    • A. Seshadri, A. Perrig, L. van Doom, and P. Khosla. Swatt: Software-based attestation for embedded devices. sp, 00:272, 2004.
  • 16
    • 27544477855 scopus 로고    scopus 로고
    • Bind: A fine-grained attestation service for secure distributed systems
    • E. Shi, A. Perrig, and L. van Doom. Bind: A fine-grained attestation service for secure distributed systems. In IEEE Symposium on Security and Privacy, pages 154-168, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    van Doom, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.