-
1
-
-
78650535355
-
-
Volatile systems. https://www.volatilesystems.com.
-
-
-
-
2
-
-
78650578104
-
-
Xenaccess library. http://code.google.com/p/xenaccess/.
-
-
-
-
3
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur., 13(1):1-40, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
78650578103
-
General-Purpose and System Instructions
-
Advanced Micro Devices 3.14 edition, September
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions, 3.14 edition, September 2007.
-
(2007)
AMD64 Architecture Programmer's Manual
, vol.3
-
-
-
6
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
Washington, DC
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In Proc. of the 2008 ACSAC, pages 77-86, Washington, DC, 2008.
-
(2008)
Proc. of the 2008 ACSAC
, pp. 77-86
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
8
-
-
74049158180
-
Mapping Kernel Objects to Enable Systematic Integrity Checking
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping Kernel Objects to Enable Systematic Integrity Checking. In Proc. of the 16th ACM CCS, 2009.
-
Proc. of the 16th ACM CCS, 2009
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
10
-
-
74049118754
-
Robust Signatures for Kernel Data Structures
-
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust Signatures for Kernel Data Structures. In Proc. of the 16th ACM CCS, pages 566-577, 2009.
-
(2009)
Proc. of the 16th ACM CCS
, pp. 566-577
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
13
-
-
77950853188
-
Stealthy Malware Detection through VMM-based "Out-of-the-Box" Semantic View Reconstruction
-
X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection through VMM-based "Out-of-the-Box" Semantic View Reconstruction. In Proc. of the 14th ACM CCS, 2007.
-
Proc. of the 14th ACM CCS, 2007
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
14
-
-
84894039099
-
Antfarm: Tracking Processes in a Virtual Machine Environment
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Antfarm: Tracking Processes in a Virtual Machine Environment. In Proc. of the 2006 USENIX Annual Technical Conference, Berkeley, CA, 2006.
-
Proc. of the 2006 USENIX Annual Technical Conference, Berkeley, CA, 2006
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
16
-
-
54049106582
-
Virtual Machine Introspection: Observation or Interference?
-
K. Nance, M. Bishop, and B. Hay. Virtual Machine Introspection: Observation or Interference? IEEE Security and Privacy, 6(5):32-37, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.5
, pp. 32-37
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
18
-
-
36049009786
-
An Architectural Approach to Preventing Code Injection Attacks
-
R. Riley, X. Jiang, and D. Xu. An Architectural Approach to Preventing Code Injection Attacks. In Proc. of the 37th DSN, pages 30-40, 2007.
-
(2007)
Proc. of the 37th DSN
, pp. 30-40
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
19
-
-
77949482509
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
-
R. Riley, X. Jiang, and D. Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In Proc. of the 11th RAID, 2008.
-
Proc. of the 11th RAID, 2008
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
20
-
-
77952351839
-
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
-
H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proc. of the 14th ACM CCS. ACM, 2007.
-
Proc. of the 14th ACM CCS. ACM, 2007
-
-
Shacham, H.1
-
22
-
-
77952405499
-
Shadow Walker: Raising the Bar for Windows Rootkit Detection
-
S. Sparks and J. Butler. Shadow Walker: Raising the Bar For Windows Rootkit Detection. Phrack, 11(63), 2005.
-
(2005)
Phrack
, vol.11
, Issue.63
-
-
Sparks, S.1
Butler, J.2
-
23
-
-
78650540060
-
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
-
A. Srivastava and J. Giffin. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. In Proc. of the 11th RAID, Berlin, Heidelberg, 2008.
-
Proc. of the 11th RAID, Berlin, Heidelberg, 2008
-
-
Srivastava, A.1
Giffin, J.2
-
24
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
DOI 10.1109/TDSC.2005.24
-
P. C. van Oorschot, A. Somayaji, and G.Wurster. Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Secur. Comput., 2(2):82-92, 2005. (Pubitemid 41259858)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 82-92
-
-
Van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
-
25
-
-
78650568911
-
-
VMware VMsafe Security Technology
-
VMware. VMware VMsafe Security Technology. http://www.vmware.com/ technical-resources/security/vmsafe.html.
-
-
-
|