-
1
-
-
60649106745
-
Automatic inference and enforcement of kernel data structures invariants
-
Baliga, A., Ganapathy, V., Iftode, L.: Automatic inference and enforcement of kernel data structures invariants. In: ACSAC, Anaheim, CA (December 2008)
-
ACSAC, Anaheim, CA (December 2008)
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
2
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)
-
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
3
-
-
74049133176
-
Cloud security is not (just) virtualization security
-
Christodorescu, M., Sailer, R., Schales, D., Sgandurra, D., Zamboni, D.: Cloud security is not (just) virtualization security. In: Cloud Computing Security Workshop, Chicago, IL (November 2009)
-
Cloud Computing Security Workshop, Chicago, IL (November 2009)
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.3
Sgandurra, D.4
Zamboni, D.5
-
4
-
-
78249255050
-
-
Community Developers (last accessed April 15, 2010)
-
Community Developers. Ebtables, http://ebtables.sourceforge.net/ (last accessed April 15, 2010)
-
Ebtables
-
-
-
5
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware analysis via hardware virtualization extensions. In: ACM CCS, Alexandria, VA (October 2008)
-
ACM CCS, Alexandria, VA (October 2008)
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
6
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In: OSDI, Boston, MA (December 2002)
-
OSDI, Boston, MA (December 2002)
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
7
-
-
0029716418
-
A sense of self for UNIX processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for UNIX processes. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 1996)
-
IEEE Symposium on Security and Privacy, Oakland, CA (May 1996)
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
9
-
-
85084162795
-
Detecting manipulated remote call streams
-
Giffin, J., Jha, S., Miller, B.: Detecting manipulated remote call streams. In: 11th USENIX Security Symposium, San Francisco, CA (August 2002)
-
11th USENIX Security Symposium, San Francisco, CA (August 2002)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
10
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
Giffin, J.T., Jha, S., Miller, B.P.: Efficient context-sensitive intrusion detection. In: NDSS, San Diego, CA (February 2004)
-
NDSS, San Diego, CA (February 2004)
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
11
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through IDS-driven dialog correlation. In: USENIX Security Symposium, Boston, MA (August 2007)
-
USENIX Security Symposium, Boston, MA (August 2007)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
12
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3), 151-180 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
13
-
-
78249271892
-
-
last accessed April 15, 2010
-
IBM. Ibm page detailer, http://www.alphaworks.ibm.com/tech/pagedetailer/ download (last accessed April 15, 2010)
-
Ibm Page Detailer
-
-
-
14
-
-
77950853188
-
Stealthy malware detection through VMM-based 'out-of-the-box' semantic view
-
Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through VMM-based 'out-of-the-box' semantic view. In: ACM CCS, Alexandria, VA (November 2007)
-
ACM CCS, Alexandria, VA (November 2007)
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
15
-
-
77952336652
-
VMM-based hidden process detection and identification using Lycosid
-
Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: VMM-based hidden process detection and identification using Lycosid. In: ACM VEE, Seattle, WA (March 2008)
-
ACM VEE, Seattle, WA (March 2008)
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
16
-
-
78249244635
-
-
last accessed April 15, 2010
-
Kasslin, K.: Evolution of kernel-mode malware, http://igloo. engineeringforfun.com/malwares/ Kimmo-Kasslin-Evolution-of-kernel-mode-malware- v2.pdf (last accessed April 15, 2010)
-
Evolution of Kernel-mode Malware
-
-
Kasslin, K.1
-
17
-
-
0003552088
-
Automatic extraction of computer virus signatures
-
Jersey, Channel Islands, UK
-
Kephart, J., Arnold, W.: Automatic extraction of computer virus signatures. In: Virus Bulletin, Jersey, Channel Islands, UK (1994)
-
(1994)
Virus Bulletin
-
-
Kephart, J.1
Arnold, W.2
-
20
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
Litty, L., Lagar-Cavilla, H.A., Lie, D.: Hypervisor support for identifying covertly executing binaries. In: USENIX Security Symposium, San Jose, CA (August 2008)
-
USENIX Security Symposium, San Jose, CA (August 2008)
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
21
-
-
56549121841
-
A layered architecture for detectingmalicious behaviors
-
Lippmann, R.,Kirda, E.,Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A layered architecture for detectingmalicious behaviors. In: Lippmann, R.,Kirda, E.,Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 78-97. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 78-97
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
22
-
-
78249251923
-
-
last accessed April 15, 2010
-
MSDN. Asynchronous procedure calls, http://msdn.microsoft.com/en-us/ library/ms681951VS.85.aspx (last accessed April 15, 2010)
-
Asynchronous Procedure Calls
-
-
-
23
-
-
78249263071
-
Storm Worm Process Injection from the Windows Kernel
-
last accessed April 15, 2010
-
OffensiveComputing. Storm Worm Process Injection from the Windows Kernel, http://www.offensivecomputing.net/?q=node/661 (last accessed April 15, 2010)
-
OffensiveComputing
-
-
-
24
-
-
78249248205
-
PassMark Performance Test
-
last accessed April 15, 2010
-
Passmark Software. PassMark Performance Test, http://www.passmark.com/ products/pt.htm (last accessed April 15, 2010)
-
Passmark Software
-
-
-
26
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An architecture for secure active monitoring using virtualization. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2008)
-
IEEE Symposium on Security and Privacy, Oakland, CA (May 2008)
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
27
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Petroni Jr., N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In: USENIX Security Symposium, Vancouver, BC, Canada (August 2006)
-
USENIX Security Symposium, Vancouver, BC, Canada (August 2006)
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
29
-
-
77954140057
-
Load your 32-bit DLL into another process's address space using injlib
-
May
-
Richter, J.: Load your 32-bit DLL into another process's address space using injlib. Microsoft Systems Journal 9(5) (May 1994)
-
(1994)
Microsoft Systems Journal
, vol.9
, Issue.5
-
-
Richter, J.1
-
30
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
32
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automaton-based method for detecting anomalous program behaviors. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
-
IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
33
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
Sharif, M., Lee, W., Cui, W., Lanzi, A.: Secure in-vm monitoring using hardware virtualization. In: ACM CCS, Chicago, IL (November 2009)
-
ACM CCS, Chicago, IL (November 2009)
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
34
-
-
78249241662
-
-
Technical Report GT-CS-09-05, Georgia Institute of Technology, Atlanta, GA
-
Srivastava, A., Erete, I., Giffin, J.: Kernel data integrity protection via memory access control. Technical Report GT-CS-09-05, Georgia Institute of Technology, Atlanta, GA (2009)
-
(2009)
Kernel Data Integrity Protection Via Memory Access Control
-
-
Srivastava, A.1
Erete, I.2
Giffin, J.3
-
35
-
-
56549109177
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Srivastava, A., Giffin, J.: Tamper-resistant, application-aware blocking of malicious network connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 39-58
-
-
Srivastava, A.1
Giffin, J.2
-
36
-
-
85084162258
-
How to 0wn the internet in your spare time
-
Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: USENIX Security Symposium, San Francisco, CA (August 2002)
-
USENIX Security Symposium, San Francisco, CA (August 2002)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
37
-
-
78249241390
-
Improving the reliability of commodity operating systems
-
Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the reliability of commodity operating systems. In: ACM SOSP, Bolton Landing, NY (October 2003)
-
ACM SOSP, Bolton Landing, NY (October 2003)
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
38
-
-
78249258881
-
Conficker/downadup: Memory injection model
-
last accessed April 15, 2010
-
ThreatExpert. Conficker/downadup: Memory injection model. http://blog.threatexpert.com/2009/01/ confickerdownadup-memory-injection.html (last accessed April 15, 2010)
-
ThreatExpert
-
-
-
39
-
-
84947603083
-
Probabilistic alert correlation
-
Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. Springer, Heidelberg
-
Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, p. 54. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2212
, pp. 54
-
-
Valdes, A.1
Skinner, K.2
-
40
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering kernel rootkits with lightweight hook protection. In: ACM CCS, Chicago, IL (November 2009)
-
ACM CCS, Chicago, IL (November 2009)
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
41
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
DOI 10.1109/MSP.2007.45
-
Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy 5(2) (March 2007) (Pubitemid 46527386)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, G.1
Holz, T.2
Freiling, F.3
|