-
2
-
-
84991799247
-
An Architecture for Specification-based Detection of Semantic Integrity Violations in Kernel Dynamic Data
-
Petroni Jr., N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An Architecture for Specification-based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proceedings of the 15th USENIX Security Symposium (2006)
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
4
-
-
85084162914
-
-
Petroni, N., Fraser, T., Molina, J., Arbaugh, W.: Copilot: A Coprocessor-based Kernel Runtime Integrity Monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179-194 (2004)
-
Petroni, N., Fraser, T., Molina, J., Arbaugh, W.: Copilot: A Coprocessor-based Kernel Runtime Integrity Monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179-194 (2004)
-
-
-
-
5
-
-
38149096122
-
-
Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 219-235. Springer, Heidelberg (2007)
-
Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
70449824733
-
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP 2007) (October 2007)
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP 2007) (October 2007)
-
-
-
-
9
-
-
56549125762
-
-
Innotek: Virtualbox (Last accessed, September 2007), http://www. virtualbox.org/
-
Innotek: Virtualbox (Last accessed, September 2007), http://www. virtualbox.org/
-
-
-
-
11
-
-
56549105894
-
-
AMD: AMD64 Architecture Programmer's Manual 2: System Programming, 3.12 edition (September 2006)
-
AMD: AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.12 edition (September 2006)
-
-
-
-
12
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay
-
Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P.: ReVirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay. In: Proc. USENIX Symposium on Operating Systems Design and Implementation (OSDI 2002) (2002)
-
(2002)
Proc. USENIX Symposium on Operating Systems Design and Implementation (OSDI
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
13
-
-
21644455412
-
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. of ACM Symposium on Operating System Principles (SOSP 2003) (October 2003)
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. of ACM Symposium on Operating System Principles (SOSP 2003) (October 2003)
-
-
-
-
14
-
-
38149053957
-
-
Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
-
Jiang, X., Wang, X.: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
84885639914
-
Detecting Past and Present Intrusions through Vulnerability-specific Predicates
-
Joshi, A., King, S., Dunlap, G., Chen, P.: Detecting Past and Present Intrusions through Vulnerability-specific Predicates. In: Proc. ACM Symposium on Operating Systems Principles (SOSP 2005), pp. 91-104 (2005)
-
(2005)
Proc. ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 91-104
-
-
Joshi, A.1
King, S.2
Dunlap, G.3
Chen, P.4
-
16
-
-
56549109367
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
-
TR 2001-146, Purdue University
-
Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. Technical report CERIAS TR 2001-146, Purdue University
-
Technical report CERIAS
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
17
-
-
0030672130
-
A Secure and Reliable Bootstrap Architecture
-
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A Secure and Reliable Bootstrap Architecture. In: Proceedings of IEEE Symposium on Security and Privacy, May 1997, pp. 65-71 (1997)
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy, May 1997
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
18
-
-
56549103019
-
-
sd, devik: Linux on-the-fly Kernel Patching without LKM. Phrack 11(58) Article 7
-
sd, devik: Linux on-the-fly Kernel Patching without LKM. Phrack 11(58) Article 7
-
-
-
-
19
-
-
56549130438
-
-
fuzen_op: Fu rootkit (Last accessed, September 2007), http://www.rootkit.com/project.php?id=12
-
fuzen_op: Fu rootkit (Last accessed, September 2007), http://www.rootkit.com/project.php?id=12
-
-
-
-
21
-
-
85062418620
-
-
Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proceedings of the 14th USENIX Security Symposium (August 2005)
-
Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proceedings of the 14th USENIX Security Symposium (August 2005)
-
-
-
-
22
-
-
34548708575
-
-
Baliga, A., Kamat, P., Iftode, L.: Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. In: Proc. of IEEE Symposium on Security and Privacy (Oakland 2007) (May 2007)
-
Baliga, A., Kamat, P., Iftode, L.: Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. In: Proc. of IEEE Symposium on Security and Privacy (Oakland 2007) (May 2007)
-
-
-
-
23
-
-
33646767376
-
Control Flow Integrity: Principles, Implementations, and Applications
-
November
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control Flow Integrity: Principles, Implementations, and Applications. In: Proc. ACM Conference on Computer and Communications Security (CCS 2005) (November 2005)
-
(2005)
Proc. ACM Conference on Computer and Communications Security (CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
28
-
-
56549093916
-
-
F-Secure Corporation
-
F-Secure Corporation: Agobot, http://www.f-secure.com/v-descs/agobot. shtml
-
Agobot
-
-
-
30
-
-
56549112948
-
-
Liston, T., Skoudis, E.: On the Cutting Edge: Thwarting Virtual Machine Detection (2006), http://handlers.sans.org/tliston/ThwartingVMDetection Liston_Skoudis.pdf
-
Liston, T., Skoudis, E.: On the Cutting Edge: Thwarting Virtual Machine Detection (2006), http://handlers.sans.org/tliston/ThwartingVMDetection Liston_Skoudis.pdf
-
-
-
-
31
-
-
56549116733
-
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008) (March 2008)
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008) (March 2008)
-
-
-
-
32
-
-
56549084121
-
-
Microsoft Corporation: Driver Signing for Windows, http://www.microsoft. com/resources/documentation/windows/xp/all/proddocs/en-us/code_signing.mspx?mfr= true
-
Driver Signing for Windows
-
-
-
33
-
-
21644451617
-
-
Kruegel, C., Robertson, W., Vigna, G.: Detecting Kernel-Level Rootkits Through Binary Analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, pp. 91-100. Springer, Heidelberg (2004)
-
Kruegel, C., Robertson, W., Vigna, G.: Detecting Kernel-Level Rootkits Through Binary Analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, pp. 91-100. Springer, Heidelberg (2004)
-
-
-
-
34
-
-
77954517653
-
Secure Coprocessorbased Intrusion Detection
-
Zhang, X., van Doorn, L., Jaeger, T., Perez, R., Sailer, R.: Secure Coprocessorbased Intrusion Detection. In: Proceedings of the 10th ACM SIGOPS European Workshop, pp. 239-242 (2002)
-
(2002)
Proceedings of the 10th ACM SIGOPS European Workshop
, pp. 239-242
-
-
Zhang, X.1
van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
-
35
-
-
27544461178
-
Detecting Stealth Software with Strider GhostBuster
-
Wang, Y.M., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Strider GhostBuster. In: Proc. IEEE International Conference on Dependable Systems and Networks (DSN 2005), pp. 368-377 (2005)
-
(2005)
Proc. IEEE International Conference on Dependable Systems and Networks (DSN
, pp. 368-377
-
-
Wang, Y.M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
36
-
-
85028170979
-
-
Kennell, R., Jamieson, L.H.: Establishing the Genuinity of Remote Computer Systems. In: Proc. of the 12th USENIX Security Symposium (August 2003)
-
Kennell, R., Jamieson, L.H.: Establishing the Genuinity of Remote Computer Systems. In: Proc. of the 12th USENIX Security Symposium (August 2003)
-
-
-
-
37
-
-
14844291531
-
Attestation-based Policy Enforcement for Remote Access
-
October
-
Sailer, R., Jaeger, T., Zhang, X., van Doorn, L.: Attestation-based Policy Enforcement for Remote Access. In: Proc. of ACM Conference on Computer and Communications Security (CCS 2004) (October 2004)
-
(2004)
Proc. of ACM Conference on Computer and Communications Security (CCS
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doorn, L.4
-
38
-
-
85084162270
-
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. of the 13th USENIX Security Symposium (August 2004)
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. of the 13th USENIX Security Symposium (August 2004)
-
-
-
|