메뉴 건너뛰기




Volumn , Issue , 2008, Pages 81-89

Virtual machine-provided context sensitive page mappings

Author keywords

Context sensitive memory; Self checksumming code; Virtual machine monitor; Xen

Indexed keywords

CHECKSUMMING; CONTEXT SENSITIVE; DATA CONTEXTS; EXECUTABLE CODES; HYPERVISOR; MEMORY MANAGEMENT; MEMORY REFERENCES; OPERATING SYSTEMS; PERFORMANCE PENALTIES; TAMPER-RESISTANT; VIRTUAL ADDRESS; VIRTUAL MACHINE MONITORS; VIRTUAL MACHINES;

EID: 77952396282     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1346256.1346268     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 1
    • 77952409855 scopus 로고    scopus 로고
    • ASPACK SOFTWARE. ASProtect Website
    • ASPACK SOFTWARE. ASProtect Website, http ://www.aspack.com/asprotect. html.
  • 10
    • 84894247776 scopus 로고    scopus 로고
    • Runtime Packers: The Hidden problem?
    • Las Vegas, USA
    • MORGENSTERN, M., AND BROSCH, T. Runtime Packers: The Hidden Problem? In Black Hat USA (Las Vegas, USA, 2007).
    • (2007) Black Hat USA
    • Morgenstern, M.1    Brosch, T.2
  • 11
    • 77952347007 scopus 로고    scopus 로고
    • PAX TEAM. PaX
    • PAX TEAM. PaX. http://pax.grsecurity.net.
  • 12
    • 77952405499 scopus 로고    scopus 로고
    • "Shadow Walker": Raising the bar for rootkit detection
    • Tokyo, Japan
    • SPARKS, S., AND BUTLER, J. "Shadow Walker": Raising the bar for rootkit detection. In Black Hat Japan (Tokyo, Japan, 2005).
    • (2005) Black Hat Japan
    • Sparks, S.1    Butler, J.2
  • 13
    • 77950841228 scopus 로고    scopus 로고
    • New security enhancements in red hat enterprise linux V.3, update 3
    • Red Hat, Inc.
    • VAN DE VEN, A. New security enhancements in red hat enterprise linux V.3, update 3. Tech. rep., Red Hat, Inc., 2004.
    • (2004) Tech. Rep.
    • Van De Ven, A.1
  • 15
    • 84864559630 scopus 로고
    • First draft of a report on the EDVAC
    • VON NEUMANN, J. First draft of a report on the EDVAC. IEEE Ann. Hist. Comput. 15, 4 (1993), 27-75.
    • (1993) IEEE Ann. Hist. Comput. , vol.15 , Issue.4 , pp. 27-75
    • Von Neumann, J.1
  • 16
    • 24344490175 scopus 로고    scopus 로고
    • A generic attack on checksumming-based software tamper resistance
    • IEEE Computer Society
    • WURSTER, G., VAN OORSCHOT, P., AND SOMAYAJI, A. A generic attack on checksumming-based software tamper resistance. In IEEE Symposium on Security and Privacy (2005), IEEE Computer Society, pp. 127-138.
    • (2005) IEEE Symposium on Security and Privacy , pp. 127-138
    • Wurster, G.1    Van Oorschot, P.2    Somayaji, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.