-
4
-
-
55649089217
-
Automated Containment of Rootkit Attacks
-
Elsevier
-
A. Baliga and L. Iftode. Automated Containment of Rootkit Attacks. Computer and Security, Elsevier, 2008.
-
(2008)
Computer and Security
-
-
Baliga, A.1
Iftode, L.2
-
5
-
-
34548708575
-
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
-
May
-
A. Baliga, P. Kamat, and L. Iftode. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. IEEE S&P'07, pages 246-251, May 2007.
-
(2007)
IEEE S&P'07
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
6
-
-
0003400255
-
Integrity Considerations for Secure Computer Systems
-
Apr
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. In MITRE Technical Report TR-3153, Apr 1977.
-
(1977)
MITRE Technical Report TR-3153
-
-
Biba, K.J.1
-
7
-
-
67649859970
-
Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
-
November
-
W. Chang, B. Streiff, and C. Lin. Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. ACM CCS, November 2008.
-
(2008)
ACM CCS
-
-
Chang, W.1
Streiff, B.2
Lin, C.3
-
8
-
-
52649112833
-
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
-
June
-
H. Chen, X. Wu, L. Yuan, B. Zang, P. chung Yew, and F. T. Chong. From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware. ISCA, June 2008.
-
(2008)
ISCA
-
-
Chen, H.1
Wu, X.2
Yuan, L.3
Zang, B.4
Chung Yew, P.5
Chong, F.T.6
-
9
-
-
0035703699
-
When Virtual is Better than Real
-
May
-
P. M. Chen and B. D. Noble. When Virtual is Better than Real. HotOS, May 2001.
-
(2001)
HotOS
-
-
Chen, P.M.1
Noble, B.D.2
-
12
-
-
21644482450
-
Minos: Control Data Attack Prevention Orthogonal to Memory Model
-
December
-
J. R. Crandall and F. T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. MICRO, pages 221-232, December 2004.
-
(2004)
MICRO
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
13
-
-
50249142448
-
Cloaker: Hardware Supported Rootkit Concealment
-
F. M. David, E. M. Chan, J. C. Carlyle, and R. H. Campbell. Cloaker: Hardware Supported Rootkit Concealment. IEEE Security and Privacy, pages 296-310, 2008.
-
(2008)
IEEE Security and Privacy
, pp. 296-310
-
-
David, F.M.1
Chan, E.M.2
Carlyle, J.C.3
Campbell, R.H.4
-
14
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.SI
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
16
-
-
53349091372
-
Compatibility is Not Transparency: VMM Detection Myths and Realities
-
T. Garfinkel, K. Adams, A. Warfield, and J. Franklin. Compatibility is Not Transparency: VMM Detection Myths and Realities. HotOS, 2007.
-
(2007)
HotOS
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
17
-
-
21644455412
-
Terra: A Virtual Machine-Based Platform for Trusted Computing
-
October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. ACM Symposium on Operating Systems Principles, pages 193-206, October 2003.
-
(2003)
ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
20
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. EuroSys, 2006.
-
(2006)
EuroSys
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
21
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
-
November
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ACM CCS, pages 128-138, November 2007.
-
(2007)
ACM CCS
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
23
-
-
33845409634
-
Detecting Past and Present Intrusions through Vulnerability-specific Predicates
-
October
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting Past and Present Intrusions through Vulnerability-specific Predicates. ACM SOSP, pages 91-104, October 2005.
-
(2005)
ACM SOSP
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
24
-
-
85084162914
-
Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor
-
N. L. P. Jr, T. Fraser, and W. A. Arbaugh. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. USENIX, 2004.
-
(2004)
USENIX
-
-
P Jr., N.L.1
Fraser, T.2
Arbaugh, W.A.3
-
25
-
-
50249114395
-
Automated Detection of Persistent Kernel Control-Flow Attacks
-
November
-
N. L. P. Jr. and M. Hicks. Automated Detection of Persistent Kernel Control-Flow Attacks. ACM CCS, pages 103-115, November 2007.
-
(2007)
ACM CCS
, pp. 103-115
-
-
P Jr., N.L.1
Hicks, M.2
-
26
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
May
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. IEEE Security and Privacy, May 2006.
-
(2006)
IEEE Security and Privacy
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
27
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
L. Litty, H. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. USENIX, 2008.
-
(2008)
USENIX
-
-
Litty, L.1
Lagar-Cavilla, H.2
Lie, D.3
-
28
-
-
34547194202
-
Manitou: A layer-below approach to fighting malware
-
October
-
L. Litty and D. Lie. Manitou: a layer-below approach to fighting malware. ASID, October 2006.
-
(2006)
ASID
-
-
Litty, L.1
Lie, D.2
-
30
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb.
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
31
-
-
84991799247
-
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
-
J. Nick L. Petroni, T. Fraser, A. Walters, and W. A. Arbaugh. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Nick, J.1
Petroni, L.2
Fraser, T.3
Walters, A.4
Arbaugh, W.A.5
-
33
-
-
40349087553
-
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
-
December
-
F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. MICRO-39, pages 135-148, December 2006.
-
(2006)
MICRO-39
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.S.4
Zhou, Y.5
Wu, Y.6
-
34
-
-
85084161596
-
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
-
J. S. Robin and C. E. Irvine. Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. USENIX, 2000.
-
(2000)
USENIX
-
-
Robin, J.S.1
Irvine, C.E.2
-
35
-
-
70450227330
-
Laminar: Practical Fine-Grained Decentralized Information Flow Control
-
June
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical Fine-Grained Decentralized Information Flow Control. PLDI, pages 63-74, June 2009.
-
(2009)
PLDI
, pp. 63-74
-
-
Roy, I.1
Porter, D.E.2
Bond, M.D.3
McKinley, K.S.4
Witchel, E.5
-
36
-
-
55549097262
-
Subverting VistaTM Kernel for Fun and Profit
-
J. Rutkowska. Subverting VistaTM Kernel For Fun And Profit. Black Hat Briefings, 2006.
-
(2006)
Black Hat Briefings
-
-
Rutkowska, J.1
-
37
-
-
77949482509
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
-
D. X. Ryan Riley, Xuxian Jiang. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. RAID, 2008.
-
(2008)
RAID
-
-
Ryan Riley, D.X.1
Jiang, X.2
-
39
-
-
48649093823
-
The Age of Data: Pinpointing guilty bytes in polymorphic buffer overflows on heap and stack
-
December
-
A. Slowinska and H. Bos. The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap and stack. ACSAC, December 2007.
-
(2007)
ACSAC.
-
-
Slowinska, A.1
Bos, H.2
-
42
-
-
70450242742
-
TAJ: Effective Taint Analysis of Web Applications
-
June
-
O. Tripp, M. Pistoia, S. Fink, M. Sridharan, and O. Weisman. TAJ: Effective Taint Analysis of Web Applications . PLDI, pages 87-97, June 2009.
-
(2009)
PLDI
, pp. 87-97
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.3
Sridharan, M.4
Weisman, O.5
-
43
-
-
77950800933
-
-
UnixBench
-
UnixBench (http://www.tux.org/pub/tux/benchmarks/).
-
-
-
-
44
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004.
-
Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
45
-
-
84887309913
-
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
46
-
-
84904088330
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS, 2006.
-
(2006)
NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
47
-
-
27544461178
-
Detecting Stealth Software with Strider GhostBuster
-
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski. Detecting Stealth Software with Strider GhostBuster. DSN, 2005.
-
(2005)
DSN
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
49
-
-
34548043501
-
Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection
-
M. Xu, X. Jiang, R. Sandhu, and X. Zhang. Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection. SACMAT, 2007.
-
(2007)
SACMAT
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
50
-
-
77950788046
-
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
-
November
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. ACM CCS 07, pages 116-127, November 2007.
-
(2007)
ACM CCS 07
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
51
-
-
77950810707
-
Hardware Enforcement of Application Security Policies Using Tagged Memory
-
N. Zeldovich, H. Kannan, M. Dalton, , and C. Kozyrakis. Hardware Enforcement of Application Security Policies Using Tagged Memory. OSDI, December 2008.
-
OSDI, December 2008
-
-
Zeldovich, N.1
Kannan, H.2
Dalton, M.3
Kozyrakis, C.4
-
55
-
-
77950787685
-
-
SPEC - Standard Performance Evaluation Corporation (http://ftp.spec.org/ cpu2000/CINT2000).
-
-
-
|