메뉴 건너뛰기




Volumn 42, Issue 2, 2008, Pages 2-13

Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems

Author keywords

Cloaking; Hypervisors; Memory protection; Multi shadowing; Operating systems; Virtual machine monitors; VMM

Indexed keywords

CLOAKING; LINUX OPERATING SYSTEM; MEMORY PROTECTION; VIRTUAL MACHINE MONITORS;

EID: 77957810674     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1346281.1346284     Document Type: Conference Paper
Times cited : (217)

References (30)
  • 8
    • 42549107933 scopus 로고    scopus 로고
    • P. Englund, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Spectrum, pages 55-62, July 2003.
    • P. Englund, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Spectrum, pages 55-62, July 2003.
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proceedings of Crypto '96, pages 104-113, 1996.
    • (1996) Proceedings of Crypto '96 , pp. 104-113
    • Kocher, P.1
  • 22
    • 33846483949 scopus 로고    scopus 로고
    • Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization
    • August
    • G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10(3), August 2006.
    • (2006) Intel Technology Journal , vol.10 , Issue.3
    • Neiger, G.1    Santoni, A.2    Leung, F.3    Rodgers, D.4    Uhlig, R.5
  • 24
    • 84926427148 scopus 로고
    • Survey of Virtual Machine Research
    • June
    • R.P. Goldberg. Survey of Virtual Machine Research. IEEE Computer, 7(6):34-45, June 1974.
    • (1974) IEEE Computer , vol.7 , Issue.6 , pp. 34-45
    • Goldberg, R.P.1
  • 25
    • 0015315880 scopus 로고
    • A Hardware Architecture for Implementing Protection Rings
    • March
    • M. D. Schroeder and J. H. Saltzer. A Hardware Architecture for Implementing Protection Rings. Communications of the ACM, 15(3):157-170, March 1972.
    • (1972) Communications of the ACM , vol.15 , Issue.3 , pp. 157-170
    • Schroeder, M.D.1    Saltzer, J.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.