메뉴 건너뛰기




Volumn , Issue , 2008, Pages 49-58

Traps, events, emulation, and enforcement: Managing the Yin and Yang of virtualization-based security

Author keywords

Debugging; Security policy; Traps; Virtualization

Indexed keywords

CURRENT TRENDS; DEBUGGING; PERFORMANCE IMPACT; PROGRAM ANALYSIS; REFERENCE MONITORS; RESOURCE PROVIDERS; SECURITY ENFORCEMENT; SECURITY GOALS; SECURITY POLICY; TRAPPING MECHANISMS; TRAPS; VIRTUAL MACHINES; VIRTUALIZATION; VIRTUALIZATION LAYERS; VIRTUALIZATIONS;

EID: 70349250387     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456482.1456491     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 3
    • 70349231856 scopus 로고    scopus 로고
    • T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X
    • T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X.
  • 4
    • 70349244291 scopus 로고    scopus 로고
    • T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X. RECON 2008, 2008. Montreal, Quebec.
    • T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X. RECON 2008, 2008. Montreal, Quebec.
  • 6
    • 33749561840 scopus 로고    scopus 로고
    • Virtual Machines, Virtual Security
    • October
    • S. M. Bellovin. Virtual Machines, Virtual Security. Communications of the ACM, 49(10), October 2006.
    • (2006) Communications of the ACM , vol.49 , Issue.10
    • Bellovin, S.M.1
  • 7
    • 0003407933 scopus 로고
    • Addison-Wesley Professional, 2 edition
    • F. Brooks. The Mythical Man Month. Addison-Wesley Professional, 2 edition, 1995.
    • (1995) The Mythical Man Month
    • Brooks, F.1
  • 11
    • 70349256823 scopus 로고    scopus 로고
    • Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors
    • RC24500 W0802-069, February
    • P. A. Karger and D. R. Safford. Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors. In IBM Research Technical Report RC24500 (W0802-069), February 2008.
    • (2008) IBM Research Technical Report
    • Karger, P.A.1    Safford, D.R.2
  • 15
    • 70349239872 scopus 로고    scopus 로고
    • The Cerberus ELF Interface
    • mayhem. The Cerberus ELF Interface. Phrack, 2003.
    • (2003) Phrack
    • mayhem1
  • 21
    • 77952326921 scopus 로고    scopus 로고
    • E. C. Sezer, P. Ning, C. Kil, and J. Xu. MemSherlock: an Automated Debugger for Unknown Memory Corruption Vulnerabilities. In Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pages 562?572, New York, NY, USA, 2007. ACM.
    • E. C. Sezer, P. Ning, C. Kil, and J. Xu. MemSherlock: an Automated Debugger for Unknown Memory Corruption Vulnerabilities. In Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pages 562?572, New York, NY, USA, 2007. ACM.
  • 22
    • 70349234976 scopus 로고    scopus 로고
    • Embedded ELF Debugging : The middle head of Cerberus
    • T. E. shell crew. Embedded ELF Debugging : the middle head of Cerberus. Phrack, 2003.
    • (2003) Phrack
    • shell crew, T.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.