메뉴 건너뛰기




Volumn , Issue , 2008, Pages 77-86

Automatic inference and enforcement of kernel data structure invariants

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC INFERENCES; CONTROL DATUM; DETECTION TECHNIQUES; FALSE POSITIVE RATES; FUNCTION POINTERS; GIBRALTARS; ROOTKITS; STRUCTURE INTEGRITIES; SYSTEM CALLS; SYSTEM SECURITIES;

EID: 60649106745     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.29     Document Type: Conference Paper
Times cited : (109)

References (36)
  • 3
    • 84880390547 scopus 로고    scopus 로고
    • Fu rootkit. http://www.rootkit.com/project.php?id=12.
    • Fu rootkit
  • 5
    • 84874346155 scopus 로고    scopus 로고
    • Packet storm. http://packetstormsecurity.org/UNIX/penetration/rootkits/.
    • Packet storm
  • 7
    • 84857573917 scopus 로고    scopus 로고
    • Sophos anti-rootkit. http://www.sophos.com/products/free-tools/sophos- anti-rootkit.html.
    • Sophos anti-rootkit
  • 8
    • 60649106321 scopus 로고    scopus 로고
    • Rootkits, part 1 of 3: A growing threat, April 2006. MacAfee AVERT Labs Whitepaper.
    • Rootkits, part 1 of 3: A growing threat, April 2006. MacAfee AVERT Labs Whitepaper.
  • 21
    • 34547194202 scopus 로고    scopus 로고
    • Manitou: A layer-below approach to fighting malware
    • Lionel Litty and David Lie. Manitou: a layer-below approach to fighting malware. In ASID, 2006.
    • (2006) ASID
    • Litty, L.1    Lie, D.2
  • 23
    • 85084160699 scopus 로고    scopus 로고
    • Larry McVoy and Carl Staelin. lmbench: portable tools for performance analysis. In ATEC '96: Proceedings of the USENIX Annual Technical Conference, May 1996.
    • Larry McVoy and Carl Staelin. lmbench: portable tools for performance analysis. In ATEC '96: Proceedings of the USENIX Annual Technical Conference, May 1996.
  • 25
    • 84991799247 scopus 로고    scopus 로고
    • Jr. Nick L. Petroni, Timothy Fraser, AAron Walters, and William A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Security '06: Proceedings of the USENIX Security Symposium, 2006.
    • Jr. Nick L. Petroni, Timothy Fraser, AAron Walters, and William A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Security '06: Proceedings of the USENIX Security Symposium, 2006.
  • 28
    • 60649106701 scopus 로고    scopus 로고
    • Defeating hardware based ram acquisition
    • Joanna Rutkowska. Defeating hardware based ram acquisition. In Blackhat Conference, 2007.
    • (2007) Blackhat Conference
    • Rutkowska, J.1
  • 29
    • 14844291531 scopus 로고    scopus 로고
    • Xiaolan Zhang, and Leendert van Doorn. Attestation-based policy enforcement for remote access
    • October
    • Reiner Sailer, Trent Jaeger, Xiaolan Zhang, and Leendert van Doorn. Attestation-based policy enforcement for remote access. In ACM Conference on Computer and Communications Security, October 2004.
    • (2004) ACM Conference on Computer and Communications Security
    • Sailer, R.1    Jaeger, T.2
  • 30
    • 85084162270 scopus 로고    scopus 로고
    • Trent Jaeger, and Leendert van Doorn. Design and implementation of a tcg-based integrity measurement architecture
    • August
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In Security04: Proceedings of the 2004 USENIX Security Symposium, August 2004.
    • (2004) Security04: Proceedings of the 2004 USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2
  • 31
    • 84885617227 scopus 로고    scopus 로고
    • Leendert van Doorn, and Pradeep K. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, and Pradeep K. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP '05: 20th ACM Symposium on Operating System Principles, 2005.
    • (2005) SOSP '05: 20th ACM Symposium on Operating System Principles
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4
  • 32
    • 27544477855 scopus 로고    scopus 로고
    • Elaine Shi, Adrian Perrig, and Leendert van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: IEEE Symposium on Security and Privacy, 2005.
    • Elaine Shi, Adrian Perrig, and Leendert van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: IEEE Symposium on Security and Privacy, 2005.
  • 33
    • 84868903285 scopus 로고    scopus 로고
    • Shellcode Security Research Team, September 2006
    • Shellcode Security Research Team. Registration weakness in linux kernel's binary formats. http://goodfellas.shellcode.com.ar/own/binfmt-en.pdf, September 2006.
    • Registration weakness in linux kernel's binary formats
  • 35
    • 60649101769 scopus 로고    scopus 로고
    • Jeffrey Wilhelm and Tzi cker Chiueh. A forced sampled execution approach to kernel rootkit identification. In RAID, 2007.
    • Jeffrey Wilhelm and Tzi cker Chiueh. A forced sampled execution approach to kernel rootkit identification. In RAID, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.