-
1
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a tcg-based integrity measurement architecture," in Proceedings of the 13th USENIX Security Symposium, August 2004.
-
Proceedings of the 13th USENIX Security Symposium, August 2004
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
3
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses," in SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, 2007, pp. 335-350.
-
SOSP '07: Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, 2007
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
4
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
R. Riley, X. Jiang, and D. Xu, "Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing," in RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2008, pp. 1-20.
-
RAID '08: Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, 2008
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
5
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," in SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003, pp. 193-206.
-
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
6
-
-
84910156435
-
vTPM: Virtualizing the Trusted Platform Module
-
USENIX, August
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM: Virtualizing the Trusted Platform Module," in Proceedings of the 15th USENIX Security Symposium. USENIX, August 2006, pp. 305-320.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
7
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 128-138.
-
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
8
-
-
84894039099
-
Antfarm: Tracking processes in a virtual machine environment
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "Antfarm: tracking processes in a virtual machine environment," in ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference, 2006, pp. 1-1
-
ATEC '06: Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference, 2006
, pp. 1-1
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
9
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
B. D. Payne, M. Carbone, and W. Lee, "Secure and flexible monitoring of virtual machines," in Annual Computer Security Applications Conference, 2007, pp. 385-397.
-
Annual Computer Security Applications Conference, 2007
, pp. 385-397
-
-
Payne, B.D.1
Carbone, M.2
Lee, W.3
-
10
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization," in IEEE Symposium on Security and Privacy, 2008, pp. 233-247.
-
IEEE Symposium on Security and Privacy, 2008
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
11
-
-
54249122693
-
TOCTOU, traps, and trusted computing
-
S. Bratus, N. D'Cunha, E. Sparks, and S. W. Smith, "TOCTOU, traps, and trusted computing," in TRUST, 2008, pp. 14-32.
-
(2008)
TRUST
, pp. 14-32
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.W.4
-
12
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie, "Hypervisor support for identifying covertly executing binaries," in SS'08: Proceedings of the 17th conference on Security symposium, 2008, pp. 243-258.
-
SS'08: Proceedings of the 17th Conference on Security Symposium, 2008
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
13
-
-
77950841996
-
-
accessed in August 2009
-
"Xen," http://www.xen.org/, accessed in August 2009.
-
-
-
-
14
-
-
84951989417
-
Xenprobes, a lightweight user-space probing framework for xen virtual machine
-
N. A. Quynh and K. Suzaki, "Xenprobes, a lightweight user-space probing framework for xen virtual machine," in ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, 2007, pp. 1-14.
-
ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, 2007
, pp. 1-14
-
-
Quynh, N.A.1
Suzaki, K.2
-
18
-
-
77950837548
-
-
PaX, http://pax.grsecurity.net/.
-
-
-
-
19
-
-
77950848034
-
-
Tux.Org, http://www.tux.org/pub/tux/benchmarks/System/unixbench/.
-
-
-
-
20
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - a coprocessor-based kernel runtime integrity monitor," in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, 2004, pp. 13-13
-
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium, 2004
, pp. 13-13
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
22
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer, "Non-control-data attacks are realistic threats," in Proceedings of USENIX Security Symposium, August 2005.
-
Proceedings of USENIX Security Symposium, August 2005
-
-
Chen, S.1
Xu, J.2
Sezer, E.3
Gauriar, P.4
Iyer, R.5
-
25
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen, "Detecting past and present intrusions through vulnerability-specific predicates," in SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, 2005, pp. 91-104.
-
SOSP '05: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, 2005
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
26
-
-
77952336652
-
Vmm-based hidden process detection and identification using lycosid
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "Vmm-based hidden process detection and identification using lycosid," in VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, 2008, pp. 91-100.
-
VEE '08: Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2008
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
27
-
-
34548043501
-
Towards a vmm-based usage control framework for os kernel integrity protection
-
M. Xu, X. Jiang, R. Sandhu, and X. Zhang, "Towards a vmm-based usage control framework for os kernel integrity protection," in SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, 2007, pp. 71-80.
-
SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
|