메뉴 건너뛰기




Volumn , Issue , 2010, Pages 82-91

DKSM: Subverting virtual machine introspection for fun and profit

Author keywords

Direct kernel structure manipulation; Introspection; Virtualization

Indexed keywords

INTROSPECTION; KERNEL STRUCTURE; SEMANTIC GAP; VIRTUAL MACHINE INTROSPECTION; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 78650574143     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2010.39     Document Type: Conference Paper
Times cited : (144)

References (25)
  • 1
    • 78650535355 scopus 로고    scopus 로고
    • Volatile systems. https://www.volatilesystems.com.
  • 2
    • 78650578104 scopus 로고    scopus 로고
    • Xenaccess library. http://code.google.com/p/xenaccess/.
  • 3
    • 72449145808 scopus 로고    scopus 로고
    • Control-flow integrity principles, implementations, and applications
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur., 13(1):1-40, 2009.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.1 , pp. 1-40
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 4
    • 78650578103 scopus 로고    scopus 로고
    • General-Purpose and System Instructions
    • Advanced Micro Devices 3.14 edition, September
    • Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions, 3.14 edition, September 2007.
    • (2007) AMD64 Architecture Programmer's Manual , vol.3
  • 6
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • Washington, DC
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In Proc. of the 2008 ACSAC, pages 77-86, Washington, DC, 2008.
    • (2008) Proc. of the 2008 ACSAC , pp. 77-86
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 13
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy Malware Detection through VMM-based "Out-of-the-Box" Semantic View Reconstruction
    • X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection through VMM-based "Out-of-the-Box" Semantic View Reconstruction. In Proc. of the 14th ACM CCS, 2007.
    • Proc. of the 14th ACM CCS, 2007
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 16
    • 54049106582 scopus 로고    scopus 로고
    • Virtual Machine Introspection: Observation or Interference?
    • K. Nance, M. Bishop, and B. Hay. Virtual Machine Introspection: Observation or Interference? IEEE Security and Privacy, 6(5):32-37, 2008.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.5 , pp. 32-37
    • Nance, K.1    Bishop, M.2    Hay, B.3
  • 18
    • 36049009786 scopus 로고    scopus 로고
    • An Architectural Approach to Preventing Code Injection Attacks
    • R. Riley, X. Jiang, and D. Xu. An Architectural Approach to Preventing Code Injection Attacks. In Proc. of the 37th DSN, pages 30-40, 2007.
    • (2007) Proc. of the 37th DSN , pp. 30-40
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 19
    • 77949482509 scopus 로고    scopus 로고
    • Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
    • R. Riley, X. Jiang, and D. Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In Proc. of the 11th RAID, 2008.
    • Proc. of the 11th RAID, 2008
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 20
    • 77952351839 scopus 로고    scopus 로고
    • The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
    • H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proc. of the 14th ACM CCS. ACM, 2007.
    • Proc. of the 14th ACM CCS. ACM, 2007
    • Shacham, H.1
  • 22
    • 77952405499 scopus 로고    scopus 로고
    • Shadow Walker: Raising the Bar for Windows Rootkit Detection
    • S. Sparks and J. Butler. Shadow Walker: Raising the Bar For Windows Rootkit Detection. Phrack, 11(63), 2005.
    • (2005) Phrack , vol.11 , Issue.63
    • Sparks, S.1    Butler, J.2
  • 25
    • 78650568911 scopus 로고    scopus 로고
    • VMware VMsafe Security Technology
    • VMware. VMware VMsafe Security Technology. http://www.vmware.com/ technical-resources/security/vmsafe.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.