-
1
-
-
72449145808
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2005).
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2005)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
78751517822
-
Attacking and Defending Networked Embedded Devices
-
BAEK, K.-H., BRATUS, S., SINCLAIR, S., AND SMITH, S. Attacking and Defending Networked Embedded Devices. In 2nd Workshop on Embedded Systems Security (WESS) (Salzburg, Austria, October 2007).
-
2nd Workshop on Embedded Systems Security (WESS) (Salzburg, Austria, October 2007)
-
-
Baek, K.-H.1
Bratus, S.2
Sinclair, S.3
Smith, S.4
-
3
-
-
34748886842
-
-
Technical Report DCS-TR-593, Rutgers University, Department of Computer Science
-
BALIGA, A., CHEN, X., AND IFTODE, L. Paladin: Automated Detection and Containment of Rootkit Attacks. In Technical Report DCS-TR-593, Rutgers University, Department of Computer Science (2006).
-
(2006)
Paladin: Automated Detection and Containment of Rootkit Attacks
-
-
Baliga, A.1
Chen, X.2
Iftode, L.3
-
4
-
-
21644433634
-
Xen and the Art of Virtualization
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the Art of Virtualization. In 19th ACM Symposium on Operating Systems Principles (SOSP) (October 2003).
-
19th ACM Symposium on Operating Systems Principles (SOSP) (October 2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
33749561840
-
Virtual Machines, Virtual Security
-
October
-
BELLOVIN, S. M. Virtual Machines, Virtual Security. Communications of the ACM 49, 10 (October 2006).
-
(2006)
Communications of the ACM
, vol.49
, pp. 10
-
-
Bellovin, S.M.1
-
7
-
-
84910156435
-
vTPM: Virtualizing the Trusted Platform Module
-
BERGER, S., CÁCERES, R., GOLDMAN, K. A., PEREZ, R., SAILER, R., AND VAN DOORN, L. vTPM: Virtualizing the Trusted Platform Module. In Proceedings of the USENIX Security Symposium (2006), pp. 305-320.
-
Proceedings of the USENIX Security Symposium (2006)
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
8
-
-
84910156435
-
vTPM: Virtualizing the Trusted Platform Module
-
BERGER, S., CACERES, R., GOLDMAN, K. A., PEREZ, R., SAILER, R., AND VAN DOORN, L. vTPM: Virtualizing the Trusted Platform Module. In USENIX Security Symposium (2006).
-
USENIX Security Symposium (2006)
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
9
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
ACM
-
BICKFORD, J., O'HARE, R., BALIGA, A., GANAPATHY, V., AND IFTODE, L. Rootkits on smart phones: attacks, implications and opportunities. In HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010), ACM, pp. 49-54.
-
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010)
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
12
-
-
78751549054
-
Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain
-
BRATUS, S., OAKLEY, J., RAMASWAMY, A., SMITH, S., AND LOCASTO, M. Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain. International Journal of Secure Software Engineering 1, 3 (2010), 1-17.
-
(2010)
International Journal of Secure Software Engineering
, vol.1
, Issue.3
, pp. 1-17
-
-
Bratus, S.1
Oakley, J.2
Ramaswamy, A.3
Smith, S.4
Locasto, M.5
-
13
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
P. Syverson and S. Jha, Eds., ACM Press
-
BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of CCS 2008 (Oct. 2008), P. Syverson and S. Jha, Eds., ACM Press, pp. 27-38.
-
Proceedings of CCS 2008 (Oct. 2008)
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
15
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
-
DUNLAP, G. W., KING, S., CINAR, S., BASRAI, M. A., AND CHEN, P. M. ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI) (February 2002).
-
Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI) (February 2002)
-
-
Dunlap, G.W.1
King, S.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
16
-
-
14844288825
-
Bypassing PaX ASLR protection
-
July
-
DURDEN, T. Bypassing PaX ASLR protection. Phrack 59, 5 (July 2002).
-
(2002)
Phrack
, vol.59
, pp. 5
-
-
Durden, T.1
-
17
-
-
53349091372
-
Compatibility is not Transparency: VMM Detection Myths and Realities
-
USENIX Association
-
GARFINKEL, T., ADAMS, K., WARFIELD, A., AND FRANKLIN, J. Compatibility is not Transparency: VMM Detection Myths and Realities. In HOTOS'07: Proceedings of the 11th USENIX workshop on Hot topics in operating systems (Berkeley, CA, USA, 2007), USENIX Association, pp. 1-6.
-
HOTOS'07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (Berkeley, CA, USA, 2007)
, pp. 1-6
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
21
-
-
85084160972
-
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
HANDLEY, M., PAXSON, V., AND KREIBICH, C. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In Proceedings of the USENIX Security Conference (2001).
-
Proceedings of the USENIX Security Conference (2001)
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
23
-
-
78249283778
-
Securing virtual machine monitors: What is needed?
-
ACM
-
KARGER, P. A. Securing virtual machine monitors: what is needed? In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (New York, NY, USA, 2009), ACM, pp. 1-2.
-
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (New York, NY, USA, 2009)
, pp. 1-2
-
-
Karger, P.A.1
-
24
-
-
54049158161
-
I/O for Virtual Machine Monitors: Security and Performance Issues
-
KARGER, P. A., AND SAFFORD, D. R. I/O for Virtual Machine Monitors: Security and Performance Issues. IEEE Security and Privacy Magazine 6, 5 (2008), 16-23.
-
(2008)
IEEE Security and Privacy Magazine
, vol.6
, Issue.5
, pp. 16-23
-
-
Karger, P.A.1
Safford, D.R.2
-
28
-
-
21644451617
-
Detecting Kernel-Level Rootkits Through Binary Analysis
-
IEEE Computer Society
-
th Annual Computer Security Applications Conference (ACSAC) (Washington, DC, USA, 2004), IEEE Computer Society, pp. 91-100.
-
th Annual Computer Security Applications Conference (ACSAC) (Washington, DC, USA, 2004)
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
29
-
-
3042642332
-
Advanced return-into-lib(c) exploits (PaX case study)
-
December
-
NERGAL. Advanced return-into-lib(c) exploits (PaX case study). Phrack 58, 4 (December 2001).
-
(2001)
Phrack
, vol.58
, pp. 4
-
-
Nergal1
-
30
-
-
50249114395
-
Automated Detection of Persistent Kernel Control-flow Attacks
-
ACM
-
th ACM conference on Computer and Communications Security (CCS) (New York, NY, USA, 2007), ACM, pp. 103-115.
-
th ACM Conference on Computer and Communications Security (CCS) (New York, NY, USA, 2007)
, pp. 103-115
-
-
Nick, L.1
Petroni, J.2
Hicks, M.3
-
32
-
-
78751511667
-
5 Short Stories about execve (Advances in Kernel Hacking II)
-
Team TESO
-
PALMERS. 5 Short Stories about execve (Advances in Kernel Hacking II). Phrack 59-0x05. Team TESO.
-
Phrack 59-0x05
-
-
Palmers1
-
33
-
-
78751535271
-
Sub proc-root Quando Sumus (Advances in Kernel Hacking)
-
PALMERS. Sub proc-root Quando Sumus (Advances in Kernel Hacking). Phrack 58-0x06.
-
Phrack 58-0x06
-
-
Palmers1
-
36
-
-
80053650188
-
All Your iFRAMEs Point to Us
-
PROVOS, N., MAVROMMATIS, P., RAJAB, M. A., AND MONROSE, F. All Your iFRAMEs Point to Us. In USENIX Security Symposium (2008).
-
USENIX Security Symposium (2008)
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
37
-
-
78751512070
-
-
Tech. Rep. TR2008-627, Dartmouth College, Computer Science, Hanover, NH, September
-
RAMASWAMY, A. Detecting kernel rootkits. Tech. Rep. TR2008-627, Dartmouth College, Computer Science, Hanover, NH, September 2008.
-
(2008)
Detecting Kernel Rootkits
-
-
Ramaswamy, A.1
-
38
-
-
78751540942
-
-
Tech. Rep. TR2009-644, Dartmouth College, Computer Science, Hanover, NH, May
-
RAMASWAMY, A. Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing. Tech. Rep. TR2009-644, Dartmouth College, Computer Science, Hanover, NH, May 2009.
-
(2009)
Autoscopy: Detecting Pattern-Searching Rootkits Via Control Flow Tracing
-
-
Ramaswamy, A.1
-
39
-
-
77949482509
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
-
RILEY, R., JIANG, X., AND XU, D. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In RAID (2008).
-
(2008)
RAID
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
42
-
-
84881225236
-
Enforceable security policies
-
SCHNEIDER, F. B. Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3, 1 (2000), 30-50.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
43
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
ACM
-
SESHADRI, A., LUK, M., QU, N., AND PERRIG, A. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles (New York, NY, USA, 2007), ACM, pp. 335-350.
-
SOSP '07: Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles (New York, NY, USA, 2007)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
48
-
-
78751554097
-
Kernel Rootkit Experiences
-
STEALTH. Kernel Rootkit Experiences. Phrack 61-0x0e.
-
Phrack 61-0x0e
-
-
Stealth1
-
49
-
-
74049120743
-
Countering Kernel Rootkits with Lightweight Hook Protection
-
WANG, Z., JIANG, X., CUI, W., AND NING, P. Countering Kernel Rootkits with Lightweight Hook Protection. In Proceedings of the ACM Conference on Computer and Communications Security (2009).
-
Proceedings of the ACM Conference on Computer and Communications Security (2009)
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
50
-
-
79960481357
-
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery
-
WANG, Z., JIANG, X., CUI, W., AND WANG, X. Countering Persistent Kernel Rootkits Through Systematic Hook Discovery. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID) (2008).
-
Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID) (2008)
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
52
-
-
69149106605
-
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In IEEE Symposium on Security and Privacy (2009).
-
IEEE Symposium on Security and Privacy (2009)
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|