메뉴 건너뛰기




Volumn , Issue , 2009, Pages 451-460

Protecting kernel code and data with a virtualization-aware collaborative operating system

Author keywords

[No Author keywords available]

Indexed keywords

DATA SEGMENT; FALSE POSITIVE; KERNEL SPACE; MICROBENCHMARKS; NON-CONTROL DATA ATTACKS; OPERATING SYSTEMS; PERFORMANCE MEASUREMENTS; PROOF OF CONCEPT; REAL-WORLD; ROOTKITS; SECURITY MECHANISM; SEMANTIC GAP; USAGE MODELS; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 77950857042     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.49     Document Type: Conference Paper
Times cited : (17)

References (55)
  • 4
    • 55649089217 scopus 로고    scopus 로고
    • Automated Containment of Rootkit Attacks
    • Elsevier
    • A. Baliga and L. Iftode. Automated Containment of Rootkit Attacks. Computer and Security, Elsevier, 2008.
    • (2008) Computer and Security
    • Baliga, A.1    Iftode, L.2
  • 5
    • 34548708575 scopus 로고    scopus 로고
    • Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
    • May
    • A. Baliga, P. Kamat, and L. Iftode. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. IEEE S&P'07, pages 246-251, May 2007.
    • (2007) IEEE S&P'07 , pp. 246-251
    • Baliga, A.1    Kamat, P.2    Iftode, L.3
  • 6
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computer Systems
    • Apr
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. In MITRE Technical Report TR-3153, Apr 1977.
    • (1977) MITRE Technical Report TR-3153
    • Biba, K.J.1
  • 7
    • 67649859970 scopus 로고    scopus 로고
    • Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis
    • November
    • W. Chang, B. Streiff, and C. Lin. Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis. ACM CCS, November 2008.
    • (2008) ACM CCS
    • Chang, W.1    Streiff, B.2    Lin, C.3
  • 8
    • 52649112833 scopus 로고    scopus 로고
    • From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
    • June
    • H. Chen, X. Wu, L. Yuan, B. Zang, P. chung Yew, and F. T. Chong. From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware. ISCA, June 2008.
    • (2008) ISCA
    • Chen, H.1    Wu, X.2    Yuan, L.3    Zang, B.4    Chung Yew, P.5    Chong, F.T.6
  • 9
    • 0035703699 scopus 로고    scopus 로고
    • When Virtual is Better than Real
    • May
    • P. M. Chen and B. D. Noble. When Virtual is Better than Real. HotOS, May 2001.
    • (2001) HotOS
    • Chen, P.M.1    Noble, B.D.2
  • 11
    • 85084160792 scopus 로고    scopus 로고
    • Understanding Data Lifetime via Whole System Simulation
    • J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. USENIX, 2004.
    • (2004) USENIX
    • Chow, J.1    Pfaff, B.2    Garfinkel, T.3    Rosenblum, M.4
  • 12
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control Data Attack Prevention Orthogonal to Memory Model
    • December
    • J. R. Crandall and F. T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. MICRO, pages 221-232, December 2004.
    • (2004) MICRO , pp. 221-232
    • Crandall, J.R.1    Chong, F.T.2
  • 14
    • 84978401615 scopus 로고    scopus 로고
    • ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224, 2002.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , Issue.SI , pp. 211-224
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 16
    • 53349091372 scopus 로고    scopus 로고
    • Compatibility is Not Transparency: VMM Detection Myths and Realities
    • T. Garfinkel, K. Adams, A. Warfield, and J. Franklin. Compatibility is Not Transparency: VMM Detection Myths and Realities. HotOS, 2007.
    • (2007) HotOS
    • Garfinkel, T.1    Adams, K.2    Warfield, A.3    Franklin, J.4
  • 21
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
    • November
    • X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. ACM CCS, pages 128-138, November 2007.
    • (2007) ACM CCS , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 23
    • 33845409634 scopus 로고    scopus 로고
    • Detecting Past and Present Intrusions through Vulnerability-specific Predicates
    • October
    • A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting Past and Present Intrusions through Vulnerability-specific Predicates. ACM SOSP, pages 91-104, October 2005.
    • (2005) ACM SOSP , pp. 91-104
    • Joshi, A.1    King, S.T.2    Dunlap, G.W.3    Chen, P.M.4
  • 24
    • 85084162914 scopus 로고    scopus 로고
    • Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor
    • N. L. P. Jr, T. Fraser, and W. A. Arbaugh. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. USENIX, 2004.
    • (2004) USENIX
    • P Jr., N.L.1    Fraser, T.2    Arbaugh, W.A.3
  • 25
    • 50249114395 scopus 로고    scopus 로고
    • Automated Detection of Persistent Kernel Control-Flow Attacks
    • November
    • N. L. P. Jr. and M. Hicks. Automated Detection of Persistent Kernel Control-Flow Attacks. ACM CCS, pages 103-115, November 2007.
    • (2007) ACM CCS , pp. 103-115
    • P Jr., N.L.1    Hicks, M.2
  • 27
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • L. Litty, H. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. USENIX, 2008.
    • (2008) USENIX
    • Litty, L.1    Lagar-Cavilla, H.2    Lie, D.3
  • 28
    • 34547194202 scopus 로고    scopus 로고
    • Manitou: A layer-below approach to fighting malware
    • October
    • L. Litty and D. Lie. Manitou: a layer-below approach to fighting malware. ASID, October 2006.
    • (2006) ASID
    • Litty, L.1    Lie, D.2
  • 30
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb.
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 31
    • 84991799247 scopus 로고    scopus 로고
    • An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
    • J. Nick L. Petroni, T. Fraser, A. Walters, and W. A. Arbaugh. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. USENIX Security, 2006.
    • (2006) USENIX Security
    • Nick, J.1    Petroni, L.2    Fraser, T.3    Walters, A.4    Arbaugh, W.A.5
  • 33
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
    • December
    • F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. MICRO-39, pages 135-148, December 2006.
    • (2006) MICRO-39 , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.S.4    Zhou, Y.5    Wu, Y.6
  • 34
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
    • J. S. Robin and C. E. Irvine. Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. USENIX, 2000.
    • (2000) USENIX
    • Robin, J.S.1    Irvine, C.E.2
  • 35
    • 70450227330 scopus 로고    scopus 로고
    • Laminar: Practical Fine-Grained Decentralized Information Flow Control
    • June
    • I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical Fine-Grained Decentralized Information Flow Control. PLDI, pages 63-74, June 2009.
    • (2009) PLDI , pp. 63-74
    • Roy, I.1    Porter, D.E.2    Bond, M.D.3    McKinley, K.S.4    Witchel, E.5
  • 36
    • 55549097262 scopus 로고    scopus 로고
    • Subverting VistaTM Kernel for Fun and Profit
    • J. Rutkowska. Subverting VistaTM Kernel For Fun And Profit. Black Hat Briefings, 2006.
    • (2006) Black Hat Briefings
    • Rutkowska, J.1
  • 37
    • 77949482509 scopus 로고    scopus 로고
    • Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
    • D. X. Ryan Riley, Xuxian Jiang. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. RAID, 2008.
    • (2008) RAID
    • Ryan Riley, D.X.1    Jiang, X.2
  • 39
    • 48649093823 scopus 로고    scopus 로고
    • The Age of Data: Pinpointing guilty bytes in polymorphic buffer overflows on heap and stack
    • December
    • A. Slowinska and H. Bos. The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap and stack. ACSAC, December 2007.
    • (2007) ACSAC.
    • Slowinska, A.1    Bos, H.2
  • 42
    • 70450242742 scopus 로고    scopus 로고
    • TAJ: Effective Taint Analysis of Web Applications
    • June
    • O. Tripp, M. Pistoia, S. Fink, M. Sridharan, and O. Weisman. TAJ: Effective Taint Analysis of Web Applications . PLDI, pages 87-97, June 2009.
    • (2009) PLDI , pp. 87-97
    • Tripp, O.1    Pistoia, M.2    Fink, S.3    Sridharan, M.4    Weisman, O.5
  • 43
    • 77950800933 scopus 로고    scopus 로고
    • UnixBench
    • UnixBench (http://www.tux.org/pub/tux/benchmarks/).
  • 45
    • 84887309913 scopus 로고    scopus 로고
    • Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. NDSS, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Kruegel, C.5    Vigna, G.6
  • 46
    • 84904088330 scopus 로고    scopus 로고
    • Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS, 2006.
    • (2006) NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.7
  • 49
    • 34548043501 scopus 로고    scopus 로고
    • Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection
    • M. Xu, X. Jiang, R. Sandhu, and X. Zhang. Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection. SACMAT, 2007.
    • (2007) SACMAT
    • Xu, M.1    Jiang, X.2    Sandhu, R.3    Zhang, X.4
  • 50
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
    • November
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. ACM CCS 07, pages 116-127, November 2007.
    • (2007) ACM CCS 07 , pp. 116-127
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5
  • 55
    • 77950787685 scopus 로고    scopus 로고
    • SPEC - Standard Performance Evaluation Corporation (http://ftp.spec.org/ cpu2000/CINT2000).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.