-
1
-
-
33646767376
-
Control-flow integrity
-
Alexandria, VA, Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Nov. 2005.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.
-
(1997)
IEEE Symposium on Security and Privacy
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY, Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, Oct. 2003.
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
60649121295
-
Invisible intruders: Rootkits in practice
-
24, Sept
-
D. Brumley. Invisible intruders: rootkits in practice. ;login:, 24, Sept. 1999.
-
(1999)
login
-
-
Brumley, D.1
-
6
-
-
0042853268
-
Integrating segmentation and paging protection for safe, efficient and transparent software extensions
-
Charleston, SC, Dec
-
T. c. Chiueh, G. Venkitachalam, and P. Pradhan. Integrating segmentation and paging protection for safe, efficient and transparent software extensions. In 17th ACM Symposium on Operating Systems Principles (SOSP), Charleston, SC, Dec. 1999.
-
(1999)
17th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Chiueh, T.C.1
Venkitachalam, G.2
Pradhan, P.3
-
9
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX, Jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, San Antonio, TX, Jan. 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
60649114249
-
-
S. Hultquist. Are rootkits the next big threat to enterprises? http://www2.csoonline.com/blog\-view.html?CID=32882, Apr. 2007.
-
S. Hultquist. Are rootkits the next big threat to enterprises? http://www2.csoonline.com/blog\-view.html?CID=32882, Apr. 2007.
-
-
-
-
14
-
-
41149176439
-
MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and con-currency bugs
-
Stevenson, WA, Oct
-
S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and con-currency bugs. In ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, Oct. 2007.
-
(2007)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Lu, S.1
Park, S.2
Hu, C.3
Ma, X.4
Jiang, W.5
Li, Z.6
Popa, R.7
Zhou, Y.8
-
15
-
-
1542355459
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
Grenoble, France, Apr
-
G. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Conference on Compiler Construction (CC), Grenoble, France, Apr. 2002.
-
(2002)
Conference on Compiler Construction (CC)
-
-
Necula, G.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
16
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Miami, FL, Dec
-
B. Payne, M. Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In 23rd Annual Computer Security Applications Conference (ACSAC), Miami, FL, Dec. 2007.
-
(2007)
23rd Annual Computer Security Applications Conference (ACSAC)
-
-
Payne, B.1
Carbone, M.2
Lee, W.3
-
17
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA, May
-
B. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Payne, B.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
18
-
-
85084162914
-
Copilot - a coprocessor-based kernel runtime integrity monitor
-
San Diego, CA, Aug
-
N. Petroni, Jr., T. Fraser, J. Molina, and W. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Petroni Jr., N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.4
-
19
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, BC, Aug
-
N. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In 15th USENIX Security Symposium, Vancouver, BC, Aug. 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Petroni Jr., N.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
21
-
-
60649084151
-
Writing linux kernel keylogger
-
June
-
rd. Writing linux kernel keylogger. Phrack, 59(11), June 2002.
-
(2002)
Phrack
, vol.59
, Issue.11
-
-
rd1
-
22
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, CA, Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
23
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.1
Schroeder, M.2
-
24
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson, WA, Oct
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, Oct. 2007.
-
(2007)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
25
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Brighton, United Kingdom, Oct
-
A. Seshadri, M. Luk, E. Shi, a. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In ACM Symposium on Operating Systems Principles (SOSP), Brighton, United Kingdom, Oct. 2005.
-
(2005)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
26
-
-
60649102197
-
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq, Aug. 1997.
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq, Aug. 1997.
-
-
-
-
27
-
-
85077691389
-
Secretly monopolizing the CPU without superuser privileges
-
Boston, MA, Aug
-
D. Tsafrir, Y. Etsion, and D. Feitelson. Secretly monopolizing the CPU without superuser privileges. In USENIX Security Symposium, Boston, MA, Aug. 2007.
-
(2007)
USENIX Security Symposium
-
-
Tsafrir, D.1
Etsion, Y.2
Feitelson, D.3
|