메뉴 건너뛰기




Volumn , Issue , 2008, Pages 97-107

Soft-timer driven transient kernel control flow attacks and defense

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL FLOWS; CPU CYCLES; FALSE NEGATIVES; FALSE POSITIVES; MALWARE; NEW CLASS; REFERENCE MONITORS; RUN-TIME; TIMER DRIVEN; VIRTUAL MACHINES;

EID: 60649107135     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.40     Document Type: Conference Paper
Times cited : (24)

References (28)
  • 5
    • 60649121295 scopus 로고    scopus 로고
    • Invisible intruders: Rootkits in practice
    • 24, Sept
    • D. Brumley. Invisible intruders: rootkits in practice. ;login:, 24, Sept. 1999.
    • (1999) login
    • Brumley, D.1
  • 10
  • 12
    • 60649114249 scopus 로고    scopus 로고
    • S. Hultquist. Are rootkits the next big threat to enterprises? http://www2.csoonline.com/blog\-view.html?CID=32882, Apr. 2007.
    • S. Hultquist. Are rootkits the next big threat to enterprises? http://www2.csoonline.com/blog\-view.html?CID=32882, Apr. 2007.
  • 14
    • 41149176439 scopus 로고    scopus 로고
    • MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and con-currency bugs
    • Stevenson, WA, Oct
    • S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and con-currency bugs. In ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, Oct. 2007.
    • (2007) ACM Symposium on Operating Systems Principles (SOSP)
    • Lu, S.1    Park, S.2    Hu, C.3    Ma, X.4    Jiang, W.5    Li, Z.6    Popa, R.7    Zhou, Y.8
  • 15
    • 1542355459 scopus 로고    scopus 로고
    • CIL: Intermediate language and tools for analysis and transformation of C programs
    • Grenoble, France, Apr
    • G. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Conference on Compiler Construction (CC), Grenoble, France, Apr. 2002.
    • (2002) Conference on Compiler Construction (CC)
    • Necula, G.1    McPeak, S.2    Rahul, S.3    Weimer, W.4
  • 19
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Vancouver, BC, Aug
    • N. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In 15th USENIX Security Symposium, Vancouver, BC, Aug. 2006.
    • (2006) 15th USENIX Security Symposium
    • Petroni Jr., N.1    Fraser, T.2    Walters, A.3    Arbaugh, W.A.4
  • 21
    • 60649084151 scopus 로고    scopus 로고
    • Writing linux kernel keylogger
    • June
    • rd. Writing linux kernel keylogger. Phrack, 59(11), June 2002.
    • (2002) Phrack , vol.59 , Issue.11
    • rd1
  • 22
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, CA, Aug
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
    • (2004) 13th USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 23
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9
    • Saltzer, J.1    Schroeder, M.2
  • 26
    • 60649102197 scopus 로고    scopus 로고
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq, Aug. 1997.
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq, Aug. 1997.
  • 27
    • 85077691389 scopus 로고    scopus 로고
    • Secretly monopolizing the CPU without superuser privileges
    • Boston, MA, Aug
    • D. Tsafrir, Y. Etsion, and D. Feitelson. Secretly monopolizing the CPU without superuser privileges. In USENIX Security Symposium, Boston, MA, Aug. 2007.
    • (2007) USENIX Security Symposium
    • Tsafrir, D.1    Etsion, Y.2    Feitelson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.