메뉴 건너뛰기




Volumn 5230 LNCS, Issue , 2008, Pages 1-20

Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing

Author keywords

[No Author keywords available]

Indexed keywords

DEPLOYABILITY; FUNDAMENTAL CHARACTERISTICS; INSTRUCTION FETCHES; KERNEL CODES; PERFORMANCE EVALUATIONS; PHYSICAL MEMORIES; PREVENTION SYSTEMS; ROOTKITS; VIRTUAL MACHINE MONITORS;

EID: 56549083677     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87403-4_1     Document Type: Conference Paper
Times cited : (181)

References (38)
  • 4
    • 85084162914 scopus 로고    scopus 로고
    • Petroni, N., Fraser, T., Molina, J., Arbaugh, W.: Copilot: A Coprocessor-based Kernel Runtime Integrity Monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179-194 (2004)
    • Petroni, N., Fraser, T., Molina, J., Arbaugh, W.: Copilot: A Coprocessor-based Kernel Runtime Integrity Monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179-194 (2004)
  • 5
    • 38149096122 scopus 로고    scopus 로고
    • Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 219-235. Springer, Heidelberg (2007)
    • Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007)
  • 7
    • 70449824733 scopus 로고    scopus 로고
    • Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP 2007) (October 2007)
    • Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP 2007) (October 2007)
  • 9
    • 56549125762 scopus 로고    scopus 로고
    • Innotek: Virtualbox (Last accessed, September 2007), http://www. virtualbox.org/
    • Innotek: Virtualbox (Last accessed, September 2007), http://www. virtualbox.org/
  • 11
    • 56549105894 scopus 로고    scopus 로고
    • AMD: AMD64 Architecture Programmer's Manual 2: System Programming, 3.12 edition (September 2006)
    • AMD: AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.12 edition (September 2006)
  • 13
    • 21644455412 scopus 로고    scopus 로고
    • Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. of ACM Symposium on Operating System Principles (SOSP 2003) (October 2003)
    • Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. of ACM Symposium on Operating System Principles (SOSP 2003) (October 2003)
  • 14
    • 38149053957 scopus 로고    scopus 로고
    • Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
    • Jiang, X., Wang, X.: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
  • 16
    • 56549109367 scopus 로고    scopus 로고
    • Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
    • TR 2001-146, Purdue University
    • Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. Technical report CERIAS TR 2001-146, Purdue University
    • Technical report CERIAS
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 18
    • 56549103019 scopus 로고    scopus 로고
    • sd, devik: Linux on-the-fly Kernel Patching without LKM. Phrack 11(58) Article 7
    • sd, devik: Linux on-the-fly Kernel Patching without LKM. Phrack 11(58) Article 7
  • 19
    • 56549130438 scopus 로고    scopus 로고
    • fuzen_op: Fu rootkit (Last accessed, September 2007), http://www.rootkit.com/project.php?id=12
    • fuzen_op: Fu rootkit (Last accessed, September 2007), http://www.rootkit.com/project.php?id=12
  • 21
    • 85062418620 scopus 로고    scopus 로고
    • Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proceedings of the 14th USENIX Security Symposium (August 2005)
    • Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proceedings of the 14th USENIX Security Symposium (August 2005)
  • 22
    • 34548708575 scopus 로고    scopus 로고
    • Baliga, A., Kamat, P., Iftode, L.: Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. In: Proc. of IEEE Symposium on Security and Privacy (Oakland 2007) (May 2007)
    • Baliga, A., Kamat, P., Iftode, L.: Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. In: Proc. of IEEE Symposium on Security and Privacy (Oakland 2007) (May 2007)
  • 28
    • 56549093916 scopus 로고    scopus 로고
    • F-Secure Corporation
    • F-Secure Corporation: Agobot, http://www.f-secure.com/v-descs/agobot. shtml
    • Agobot
  • 30
    • 56549112948 scopus 로고    scopus 로고
    • Liston, T., Skoudis, E.: On the Cutting Edge: Thwarting Virtual Machine Detection (2006), http://handlers.sans.org/tliston/ThwartingVMDetection Liston_Skoudis.pdf
    • Liston, T., Skoudis, E.: On the Cutting Edge: Thwarting Virtual Machine Detection (2006), http://handlers.sans.org/tliston/ThwartingVMDetection Liston_Skoudis.pdf
  • 31
    • 56549116733 scopus 로고    scopus 로고
    • Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008) (March 2008)
    • Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: Proc. of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008) (March 2008)
  • 32
    • 56549084121 scopus 로고    scopus 로고
    • Microsoft Corporation: Driver Signing for Windows, http://www.microsoft. com/resources/documentation/windows/xp/all/proddocs/en-us/code_signing.mspx?mfr= true
    • Driver Signing for Windows
  • 33
    • 21644451617 scopus 로고    scopus 로고
    • Kruegel, C., Robertson, W., Vigna, G.: Detecting Kernel-Level Rootkits Through Binary Analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, pp. 91-100. Springer, Heidelberg (2004)
    • Kruegel, C., Robertson, W., Vigna, G.: Detecting Kernel-Level Rootkits Through Binary Analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, pp. 91-100. Springer, Heidelberg (2004)
  • 36
    • 85028170979 scopus 로고    scopus 로고
    • Kennell, R., Jamieson, L.H.: Establishing the Genuinity of Remote Computer Systems. In: Proc. of the 12th USENIX Security Symposium (August 2003)
    • Kennell, R., Jamieson, L.H.: Establishing the Genuinity of Remote Computer Systems. In: Proc. of the 12th USENIX Security Symposium (August 2003)
  • 38
    • 85084162270 scopus 로고    scopus 로고
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. of the 13th USENIX Security Symposium (August 2004)
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. of the 13th USENIX Security Symposium (August 2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.