메뉴 건너뛰기




Volumn 6047 LNCS, Issue , 2010, Pages 138-152

Host-based security sensor integrity in multiprocessing environments

Author keywords

[No Author keywords available]

Indexed keywords

CAUSAL MODEL; DEFENCE MECHANISMS; DEFENSIVE MEASURES; EXPERIMENTAL VALIDATIONS; FORMAL MODEL; HARDWARE COMPONENTS; HIGHER ORDER; HOST-BASED; HOST-BASED SENSORS; KEY LOCATION; MULTI CORE; MULTIPROCESSOR-SYSTEM; NON-LINEARITY; NONUNIFORM; OPERATING SYSTEMS; SECURITY CONTROLS; SECURITY SENSORS; SELF-DEFENCE; SELF-OBSERVATION; VIRTUALISATION;

EID: 78149475419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12827-1_11     Document Type: Conference Paper
Times cited : (2)

References (34)
  • 4
    • 77953738291 scopus 로고    scopus 로고
    • Beyond the cpu: Defeating hardware based ram acquisition
    • Rutkowska, J.: Beyond the cpu: Defeating hardware based ram acquisition. Defcon (2007).
    • (2007) Defcon
    • Rutkowska, J.1
  • 5
    • 77953773303 scopus 로고    scopus 로고
    • Implementing and detecting an ACPI BIOS root kit
    • Las Vegas, NV, USA July
    • Heasman, J.: Implementing and Detecting an ACPI BIOS Root Kit. In: Briefing at Black Hat 2005, Las Vegas, NV, USA (July 2005).
    • (2005) Briefing at Black Hat 2005
    • Heasman, J.1
  • 8
    • 33244459571 scopus 로고
    • Secure coprocessors in electronic commerce applications
    • Geer, D.E. (ed.), USENIX Press, New York
    • Yee, B., Tygar, J.D.: Secure Coprocessors in Electronic Commerce Applications. In: Geer, D.E. (ed.) Proceedings of the First USENIX Workshop on Electronic Commerce, p. 14. USENIX Press, New York (1995).
    • (1995) Proceedings of the First USENIX Workshop on Electronic Commerce , pp. 14
    • Yee, B.1    Tygar, J.D.2
  • 13
    • 78650283917 scopus 로고    scopus 로고
    • An overview of unix rootkits
    • IDefence Inc., 14151 Newbrook Suite, Chantilly, VA 20151
    • Chuvakin, A.: An overview of unix rootkits. White Paper, iDefense Laboratories, iDefence Inc., 14151 Newbrook Suite, Chantilly, VA 20151 (2003).
    • (2003) White Paper, iDefense Laboratories
    • Chuvakin, A.1
  • 14
    • 38149096122 scopus 로고    scopus 로고
    • A forced sampled execution approach to kernel rootkit identification
    • Kruegel, C. Lippmann, R. Clark, A. (eds.), LNCS, Springer, Heidelberg
    • Wilhelm, J., cker Chiueh, T.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007).
    • (2007) RAID 2007 , vol.4637 , pp. 219-235
    • Wilhelm, J.1    Cker Chiueh, T.2
  • 16
    • 84944056948 scopus 로고    scopus 로고
    • Using independent auditors as intrusion detection systems
    • Deng, R.H. Qing, S. Bao, F. Zhou, J. (eds.), LNCS, Springer, Heidelberg
    • Molina, J., Arbaugh, W.: Using Independent Auditors as Intrusion Detection Systems. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 291-302. Springer, Heidelberg (2002).
    • (2002) ICICS 2002 , vol.2513 , pp. 291-302
    • Molina, J.1    Arbaugh, W.2
  • 17
    • 33846240066 scopus 로고    scopus 로고
    • CuPIDS: An exploration of highly focused, co-processor-based information system protection
    • Williams, P.D., Spafford, E.H.: CuPIDS: An Exploration of Highly Focused, Co-Processor-based Information System Protection. Computer Networks 51(5), 1284-1298 (2007).
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1284-1298
    • Williams, P.D.1    Spafford, E.H.2
  • 18
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Lippmann, R. Kirda, E. Trachtenberg, A. (eds.), LNCS, Springer, Heidelberg
    • Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008).
    • (2008) RAID 2008 , vol.5230 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 21
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through VMM-based "out-of-the-box" Semantic view reconstruction
    • De Capitani di Vimercati, S. Syverson, P. (eds.), ACM Press, New York
    • Jiang, X., Wang, X., Xu, D.: Stealthy Malware Detection through VMM-based "out-of-the-box" Semantic View Reconstruction. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 128-138. ACM Press, New York (2007).
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 27
    • 78650261411 scopus 로고    scopus 로고
    • (for review), A (Anonymised for review). In (Anonymised for review) September 2008
    • (for review), A (Anonymised for review). In (Anonymised for review) (September 2008).
  • 30
    • 4344715560 scopus 로고    scopus 로고
    • Taking a lesson from stealthy rootkits
    • Ring, S., Cole, E.: Taking a Lesson from Stealthy Rootkits. IEEE Security and Privacy 02(4), 38-45 (2004).
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 38-45
    • Ring, S.1    Cole, E.2
  • 32
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • Zamboni, D. (ed.), LNCS, Springer, Heidelberg
    • Cavallaro, L., Saxena, P., Sekar, R.: On the Limits of Information Flow Techniques for Malware Analysis and Containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008).
    • (2008) DIMVA 2008 , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.