메뉴 건너뛰기




Volumn , Issue , 2010, Pages 51-60

VM-based security overkill: A lament for applied systems security research

Author keywords

isolation; virtualization; vm

Indexed keywords

ALTERNATIVE APPROACH; ISOLATION; PROGRAMMABLE HARDWARE; PROTECTION MECHANISMS; SECURITY PROPERTIES; STANDARD TOOLS; SYSTEMS SECURITY; VIRTUAL MACHINES; VIRTUALIZATIONS; VM; HYPERVISORS; SELF PROTECTION;

EID: 78751512625     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1900546.1900554     Document Type: Conference Paper
Times cited : (14)

References (53)
  • 6
    • 33749561840 scopus 로고    scopus 로고
    • Virtual Machines, Virtual Security
    • October
    • BELLOVIN, S. M. Virtual Machines, Virtual Security. Communications of the ACM 49, 10 (October 2006).
    • (2006) Communications of the ACM , vol.49 , pp. 10
    • Bellovin, S.M.1
  • 13
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • P. Syverson and S. Jha, Eds., ACM Press
    • BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of CCS 2008 (Oct. 2008), P. Syverson and S. Jha, Eds., ACM Press, pp. 27-38.
    • Proceedings of CCS 2008 (Oct. 2008) , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 16
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • July
    • DURDEN, T. Bypassing PaX ASLR protection. Phrack 59, 5 (July 2002).
    • (2002) Phrack , vol.59 , pp. 5
    • Durden, T.1
  • 24
    • 54049158161 scopus 로고    scopus 로고
    • I/O for Virtual Machine Monitors: Security and Performance Issues
    • KARGER, P. A., AND SAFFORD, D. R. I/O for Virtual Machine Monitors: Security and Performance Issues. IEEE Security and Privacy Magazine 6, 5 (2008), 16-23.
    • (2008) IEEE Security and Privacy Magazine , vol.6 , Issue.5 , pp. 16-23
    • Karger, P.A.1    Safford, D.R.2
  • 29
    • 3042642332 scopus 로고    scopus 로고
    • Advanced return-into-lib(c) exploits (PaX case study)
    • December
    • NERGAL. Advanced return-into-lib(c) exploits (PaX case study). Phrack 58, 4 (December 2001).
    • (2001) Phrack , vol.58 , pp. 4
    • Nergal1
  • 32
    • 78751511667 scopus 로고    scopus 로고
    • 5 Short Stories about execve (Advances in Kernel Hacking II)
    • Team TESO
    • PALMERS. 5 Short Stories about execve (Advances in Kernel Hacking II). Phrack 59-0x05. Team TESO.
    • Phrack 59-0x05
    • Palmers1
  • 33
    • 78751535271 scopus 로고    scopus 로고
    • Sub proc-root Quando Sumus (Advances in Kernel Hacking)
    • PALMERS. Sub proc-root Quando Sumus (Advances in Kernel Hacking). Phrack 58-0x06.
    • Phrack 58-0x06
    • Palmers1
  • 37
    • 78751512070 scopus 로고    scopus 로고
    • Tech. Rep. TR2008-627, Dartmouth College, Computer Science, Hanover, NH, September
    • RAMASWAMY, A. Detecting kernel rootkits. Tech. Rep. TR2008-627, Dartmouth College, Computer Science, Hanover, NH, September 2008.
    • (2008) Detecting Kernel Rootkits
    • Ramaswamy, A.1
  • 39
    • 77949482509 scopus 로고    scopus 로고
    • Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
    • RILEY, R., JIANG, X., AND XU, D. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In RAID (2008).
    • (2008) RAID
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 42
  • 48
    • 78751554097 scopus 로고    scopus 로고
    • Kernel Rootkit Experiences
    • STEALTH. Kernel Rootkit Experiences. Phrack 61-0x0e.
    • Phrack 61-0x0e
    • Stealth1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.