-
1
-
-
77952345125
-
-
90210. Bypassing klister 0.4 with no hooks or running a controlled thread scheduler, hi-tech.nsys.by/33
-
90210. Bypassing klister 0.4 with no hooks or running a controlled thread scheduler, hi-tech.nsys.by/33/.
-
-
-
-
4
-
-
77952381909
-
-
B. Cogswell and M. Russinovich. Pslist
-
B. Cogswell and M. Russinovich. Pslist. www.sysinternals.com.
-
-
-
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing (Lake George), New York, October
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03), Bolton Landing (Lake George), New York, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03)
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
8
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston, Massachusetts, December
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 02), Boston, Massachusetts, December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 02)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
9
-
-
77952374916
-
-
fuzen-op. fu.exe and msdirectx.sys
-
fuzen-op. fu.exe and msdirectx.sys. www.rootkit.com/.
-
-
-
-
11
-
-
0031199613
-
Exploiting process lifetime distributions for dynamic load balancing
-
M. Harchol-Balter and A. B. Downey. Exploiting process lifetime distributions for dynamic load balancing. ACM Trans. Comput. Syst., 15(3):253-285, 1997.
-
(1997)
ACM Trans. Comput. Syst.
, vol.15
, Issue.3
, pp. 253-285
-
-
Harchol-Balter, M.1
Downey, A.B.2
-
12
-
-
77952394888
-
-
Holy Father. HackerDefender. hxdef.org.
-
Holy Father. HackerDefender. hxdef.org.
-
-
-
-
14
-
-
77952406471
-
-
Intel Corporation. Vtx specification, developer.intel.com
-
Intel Corporation. Vtx specification, developer.intel.com, 2005.
-
(2005)
-
-
-
15
-
-
84894039099
-
Antfarm: Tracking Processes in a Virtual Machine Environment
-
Boston, Massachusetts, June
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Antfarm: Tracking Processes in a Virtual Machine Environment. In Proceedings of the USENIX Annual Technical Conference (USENIX '06), Boston, Massachusetts, June 2006.
-
(2006)
Proceedings of the USENIX Annual Technical Conference (USENIX '06)
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
16
-
-
34547432611
-
Geiger: Monitoring the buffer cache in a virtual machine environment
-
San Jose, California, October
-
S. T. Jones, A. C. Arpaci-Dusseau, andR. H. Arpaci-Dusseau. Geiger: Monitoring the Buffer Cache in a Virtual Machine Environment. In Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII), San Jose, California, October 2006.
-
(2006)
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII)
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
17
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
ACM Press
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, pages 91-104. ACM Press, 2005.
-
(2005)
SOSP '05: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
18
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
19
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
November
-
P. Karger, M. Zurko, D. Bonin, A. Mason, and C. Kahn. A retrospective on the VAX VMM security kernel. In IEEE Transactions on Software Engineering, volume 17, pages 1147-1165, November 1991.
-
(1991)
IEEE Transactions on Software Engineering, Volume
, vol.17
, pp. 1147-1165
-
-
Karger, P.1
Zurko, M.2
Bonin, D.3
Mason, A.4
Kahn, C.5
-
23
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
August
-
N. L. Petroni, T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium, pages 179-194, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
24
-
-
33748324384
-
-
R Development Core Team. R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2006. ISBN 3-900051-07-0.
-
(2006)
R: A Language and Environment for Statistical Computing
-
-
-
26
-
-
77952410354
-
-
J. Rutkowska. klister. www.invisiblethings.org/ tools/ klister-0.4.zip.
-
Klister
-
-
Rutkowska, J.1
-
27
-
-
77952400470
-
-
SANS Institute.
-
SANS Institute. Subseven trojan v 1.1. www.sans.org/ resources/ idfaq/ subseven.php.
-
Subseven Trojan v 1.1
-
-
-
28
-
-
77952391752
-
-
sd and devik. Suckit. Phrack #58, article 0×07.
-
sd and devik. Suckit. Phrack #58, article 0×07.
-
-
-
-
29
-
-
0003503387
-
-
John Wiley & Sons, Inc., New York, NY, 3rd edition, September
-
A. Wald. Sequential Analysis. John Wiley & Sons, Inc., New York, NY, 3rd edition, September 1952.
-
(1952)
Sequential Analysis
-
-
Wald, A.1
-
30
-
-
27544461178
-
Detecting stealth software with strider ghostbuster
-
June
-
Y-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski. Detecting stealth software with strider ghostbuster. In Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), pages 368-377, June 2005.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005)
, pp. 368-377
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
|