-
2
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Petroni, N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proceedings of the 15th USENIX Security Symposium (2006).
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Petroni, N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
3
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
vol. 0, IEEE Computer Society, Los Alamitos
-
King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), vol. 0, pp. 314-327. IEEE Computer Society, Los Alamitos (2006).
-
(2006)
2006 IEEE Symposium on Security and Privacy (S&P 2006)
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
4
-
-
77953738291
-
Beyond the cpu: Defeating hardware based ram acquisition
-
Rutkowska, J.: Beyond the cpu: Defeating hardware based ram acquisition. Defcon (2007).
-
(2007)
Defcon
-
-
Rutkowska, J.1
-
5
-
-
77953773303
-
Implementing and detecting an ACPI BIOS root kit
-
Las Vegas, NV, USA July
-
Heasman, J.: Implementing and Detecting an ACPI BIOS Root Kit. In: Briefing at Black Hat 2005, Las Vegas, NV, USA (July 2005).
-
(2005)
Briefing at Black Hat 2005
-
-
Heasman, J.1
-
8
-
-
33244459571
-
Secure coprocessors in electronic commerce applications
-
Geer, D.E. (ed.), USENIX Press, New York
-
Yee, B., Tygar, J.D.: Secure Coprocessors in Electronic Commerce Applications. In: Geer, D.E. (ed.) Proceedings of the First USENIX Workshop on Electronic Commerce, p. 14. USENIX Press, New York (1995).
-
(1995)
Proceedings of the First USENIX Workshop on Electronic Commerce
, pp. 14
-
-
Yee, B.1
Tygar, J.D.2
-
9
-
-
27544461178
-
Detecting stealth software with strider ghostbuster
-
IEEE Computer Society, Los Alamitos
-
Wang, Y.-M., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Strider GhostBuster. In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), pp. 368-377. IEEE Computer Society, Los Alamitos (2005).
-
(2005)
2005 International Conference on Dependable Systems and Networks (DSN 2005)
, pp. 368-377
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
10
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
di Vimercati, S.D.C. Syverson, P. (eds.), ACM Press, New York
-
Petroni Jr., N.L., Hicks, M.: Automated Detection of Persistent Kernel Control- Flow Attacks. In: di Vimercati, S.D.C., Syverson, P. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 103-115. ACM Press, New York (2007).
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 103-115
-
-
Petroni Jr., N.L.1
Hicks, M.2
-
11
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Press, Piscataway
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-Aware Malware Detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 32-46. IEEE Press, Piscataway (2005).
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005)
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
12
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data
-
IEEE Press, Piscataway
-
Baliga, A., Kamat, P., Iftode, L.: Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), pp. 246-251. IEEE Press, Piscataway (2007).
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007)
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
13
-
-
78650283917
-
An overview of unix rootkits
-
IDefence Inc., 14151 Newbrook Suite, Chantilly, VA 20151
-
Chuvakin, A.: An overview of unix rootkits. White Paper, iDefense Laboratories, iDefence Inc., 14151 Newbrook Suite, Chantilly, VA 20151 (2003).
-
(2003)
White Paper, iDefense Laboratories
-
-
Chuvakin, A.1
-
14
-
-
38149096122
-
A forced sampled execution approach to kernel rootkit identification
-
Kruegel, C. Lippmann, R. Clark, A. (eds.), LNCS, Springer, Heidelberg
-
Wilhelm, J., cker Chiueh, T.: A Forced Sampled Execution Approach to Kernel Rootkit Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007).
-
(2007)
RAID 2007
, vol.4637
, pp. 219-235
-
-
Wilhelm, J.1
Cker Chiueh, T.2
-
15
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
Muller, G. Jul, E. (eds.), ACM Press, New York
-
Zhang, X., van Doorn, L., Jaeger, T., Perez, R., Sailer, R.: Secure Coprocessor- Based Intrusion Detection. In: Muller, G., Jul, E. (eds.) Proceedings of the 10th ACM SIGOPS European Workshop, pp. 239-242. ACM Press, New York (2002).
-
(2002)
Proceedings of the 10th ACM SIGOPS European Workshop
, pp. 239-242
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
-
16
-
-
84944056948
-
Using independent auditors as intrusion detection systems
-
Deng, R.H. Qing, S. Bao, F. Zhou, J. (eds.), LNCS, Springer, Heidelberg
-
Molina, J., Arbaugh, W.: Using Independent Auditors as Intrusion Detection Systems. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 291-302. Springer, Heidelberg (2002).
-
(2002)
ICICS 2002
, vol.2513
, pp. 291-302
-
-
Molina, J.1
Arbaugh, W.2
-
17
-
-
33846240066
-
CuPIDS: An exploration of highly focused, co-processor-based information system protection
-
Williams, P.D., Spafford, E.H.: CuPIDS: An Exploration of Highly Focused, Co-Processor-based Information System Protection. Computer Networks 51(5), 1284-1298 (2007).
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1284-1298
-
-
Williams, P.D.1
Spafford, E.H.2
-
18
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Lippmann, R. Kirda, E. Trachtenberg, A. (eds.), LNCS, Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008).
-
(2008)
RAID 2008
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
19
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Ning, P. Syverson, P. Jha, S. (eds.), ACM Press, New York
-
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: Ning, P., Syverson, P., Jha, S. (eds.) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pp. 51-62. ACM Press, New York (2008).
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
20
-
-
70349260987
-
Efficiently tracking application interactions using lightweight virtualization
-
Nieh, J. Stavrou, A. (eds.), ACM Press, New York
-
Huang, Y., Stavrou, A., Ghosh, A.K., Jajodia, S.: Efficiently Tracking Application Interactions using Lightweight Virtualization. In: Nieh, J., Stavrou, A. (eds.) Proceedings of the 1st ACM Workshop on Virtual Machine Security (VMSec 2008), pp. 19-28. ACM Press, New York (2008).
-
(2008)
Proceedings of the 1st ACM Workshop on Virtual Machine Security (VMSec 2008)
, pp. 19-28
-
-
Huang, Y.1
Stavrou, A.2
Ghosh, A.K.3
Jajodia, S.4
-
21
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box" Semantic view reconstruction
-
De Capitani di Vimercati, S. Syverson, P. (eds.), ACM Press, New York
-
Jiang, X., Wang, X., Xu, D.: Stealthy Malware Detection through VMM-based "out-of-the-box" Semantic View Reconstruction. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 128-138. ACM Press, New York (2007).
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
22
-
-
70349128844
-
Multi-aspect profiling of kernel rootkit behavior
-
ACM Press, Nuremberg
-
Riley, R., Jiang, X., Xu, D.: Multi-Aspect Profiling of Kernel Rootkit Behavior. In: Proceedings of the 4th ACM European Conference on Computer Systems, pp. 47-69. ACM Press, Nuremberg (2008).
-
(2008)
Proceedings of the 4th ACM European Conference on Computer Systems
, pp. 47-69
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
23
-
-
70349239516
-
Improving coherency of runtime integrity measurement
-
ACM Press, Alexandria
-
Thober, M., Pendergrass, J.A., McDonell, C.D.: Improving Coherency of Runtime Integrity Measurement. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, pp. 51-60. ACM Press, Alexandria (2008).
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 51-60
-
-
Thober, M.1
Pendergrass, J.A.2
McDonell, C.D.3
-
24
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
ACM Press, Alexandria
-
Loscocco, P., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux Kernel Integrity Measurement using Contextual Inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 21-29. ACM Press, Alexandria (2007).
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 21-29
-
-
Loscocco, P.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
25
-
-
0036957148
-
Enhancing software reliability with speculative threads
-
Gharachorloo, K. (ed.), ACM Press, New York
-
Oplinger, J., Lam, M.S.: Enhancing Software Reliability with Speculative Threads. In: Gharachorloo, K. (ed.) Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), pp. 184-196. ACM Press, New York (2002).
-
(2002)
Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
, pp. 184-196
-
-
Oplinger, J.1
Lam, M.S.2
-
26
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
Eggers, S. Larus, J. (eds.), ACM Press, New York
-
Nightingale, E.B., Peek, D., Chen, P.M., Flinn, J.: Parallelizing Security Checks on Commodity Hardware. In: Eggers, S., Larus, J. (eds.) Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), pp. 308-318. ACM Press, New York (2008).
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
, pp. 308-318
-
-
Nightingale, E.B.1
Peek, D.2
Chen, P.M.3
Flinn, J.4
-
27
-
-
78650261411
-
-
(for review), A (Anonymised for review). In (Anonymised for review) September 2008
-
(for review), A (Anonymised for review). In (Anonymised for review) (September 2008).
-
-
-
-
29
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
vol. 0
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy, vol. 0, pp. 231-245 (2007).
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
30
-
-
4344715560
-
Taking a lesson from stealthy rootkits
-
Ring, S., Cole, E.: Taking a Lesson from Stealthy Rootkits. IEEE Security and Privacy 02(4), 38-45 (2004).
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 38-45
-
-
Ring, S.1
Cole, E.2
-
31
-
-
48649087530
-
Limits of static analysis for malware detection
-
IEEE Press, Miami Beach
-
Moser, A., Kruegel, C., Kirda, E.: Limits of Static Analysis for Malware Detection. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), pp. 421-430. IEEE Press, Miami Beach (2007).
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
32
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Zamboni, D. (ed.), LNCS, Springer, Heidelberg
-
Cavallaro, L., Saxena, P., Sekar, R.: On the Limits of Information Flow Techniques for Malware Analysis and Containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008).
-
(2008)
DIMVA 2008
, vol.5137
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
33
-
-
35648995516
-
The landscape of parallel computing research: A view from berkeley
-
University of California, Berkeley December
-
Asanovic, K., Bodik, R., Catanzaro, B.C., Gebis, J.J., Husbands, P., Keutzer, K., Patterson, D.A., Plishker, W.L., Shalf, J., Williams, S.W., Yelick, K.A.: The landscape of parallel computing research: A view from berkeley. Technical Report UCB/EECS-2006-183, EECS Department, University of California, Berkeley (December 2006).
-
(2006)
Technical Report UCB/EECS-2006-183, EECS Department
-
-
Asanovic, K.1
Bodik, R.2
Catanzaro, B.C.3
Gebis, J.J.4
Husbands, P.5
Keutzer, K.6
Patterson, D.A.7
Plishker, W.L.8
Shalf, J.9
Williams, S.W.10
Yelick, K.A.11
|