-
1
-
-
33646767376
-
Controlflow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Controlflow integrity", ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Nov. 2005.
-
ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Nov. 2005
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture", In IEEE Computer Society Conference on Security and Privacy. IEEE, 1997, pp. 65-71.
-
(1997)
IEEE Computer Society Conference on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
3
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data
-
A. Baliga, P. Kamat and L. Iftode, "Lurking in the shadows: identifying systemic threats to kernel data", IEEE Symposium on Security and Privacy, Oakland, CA, May 2007.
-
IEEE Symposium on Security and Privacy, Oakland, CA, May 2007
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, et al., "Xen and the art of virtualization", ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, Oct. 2003.
-
ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, Oct. 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
-
6
-
-
79952394985
-
-
accessed August 16, 2010
-
chkrootkit. http://www.chkrootkit.org/, accessed August 16, 2010.
-
-
-
-
8
-
-
35348872682
-
The Daikon system for dynamic detection of likely invariants
-
M. D. Ernst, J. H. Perkins, P. J. Guo, S. McCamant, C. Pacheco, M. S. Tschantz, and C. Xiao, "The Daikon system for dynamic detection of likely invariants", In Science of Computer Programming, 2007.
-
(2007)
Science of Computer Programming
-
-
Ernst, M.D.1
Perkins, J.H.2
Guo, P.J.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.S.6
Xiao, C.7
-
10
-
-
15944399704
-
Toward a trusted immutable kernel extension (TIKE) for selfhealing systems: A virtual machine approach
-
J. Grizzard, E. Dodson, G. Conti, J. Levine, and H. Owen, "Toward a trusted immutable kernel extension (TIKE) for selfhealing systems: a virtual machine approach", Proceedings of 5th IEEE Information Assurance Workshop, 2004.
-
Proceedings of 5th IEEE Information Assurance Workshop, 2004
-
-
Grizzard, J.1
Dodson, E.2
Conti, G.3
Levine, J.4
Owen, H.5
-
15
-
-
70450080729
-
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
-
C. Kil, E. Sezer, A. Azab, P. Ning, and X. Zhang, "Remote attestation to dynamic system properties: Towards providing complete system integrity evidence", Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), Lisbon, Portugal, 2009.
-
Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), Lisbon, Portugal, 2009
-
-
Kil, C.1
Sezer, E.2
Azab, A.3
Ning, P.4
Zhang, X.5
-
16
-
-
84897441995
-
Re-establishing trust in compromised systems: Recovering from rootkits that trojan the system call table
-
J. Levine and J. Grizzard and H. Owen, "Re-establishing trust in compromised systems: recovering from rootkits that trojan the system call table", Proceedings of 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 2004.
-
Proceedings of 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 2004
-
-
Levine, J.1
Grizzard, J.2
Owen, H.3
-
20
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. Petroni, Jr., T. Fraser, J. Molina, W. A. Arbaugh, "Copilot - a coprocessor-based kernel runtime integrity monitor", 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
13th USENIX Security Symposium, San Diego, CA, Aug. 2004
-
-
Petroni Jr., N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
21
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
N. Petroni, T. Fraser, A. Walters, and W. Arbaugh, "An architecture for specification-based detection of semantic integrity violations in kernel dynamic data", 15th USENIX Security Symposium, 2006.
-
15th USENIX Security Symposium, 2006
-
-
Petroni, N.1
Fraser, T.2
Walters, A.3
Arbaugh, W.4
-
22
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
N. Petroni and M. Hicks, "Automated detection of persistent kernel control-flow attacks", 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2007.
-
14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2007
-
-
Petroni, N.1
Hicks, M.2
-
23
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture", 13th USENIX Security Symposium, 2004.
-
13th USENIX Security Symposium, 2004
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
24
-
-
54249113887
-
-
accessed August 16, 2010
-
J. Sheehy, G. Coker, J. Guttman, et al. "Attestation: evidence and trust", http://www.mitre.org/work/tech-papers/tech-papers-07/07-0186/07- 0186.pdf, accessed August 16, 2010.
-
Attestation: Evidence and Trust
-
-
Sheehy, J.1
Coker, G.2
Guttman, J.3
-
25
-
-
84855723153
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
L. Singaravelu, C. Pu, H. Haertig, C. Helmuth, "Reducing TCB complexity for security-sensitive applications: three case studies", 1st ACM SIGOPS/EuroSys European Conference on Computer Systems, Leuven, Belgium, April 2006.
-
1st ACM SIGOPS/EuroSys European Conference on Computer Systems, Leuven, Belgium, April 2006
-
-
Singaravelu, L.1
Pu, C.2
Haertig, H.3
Helmuth, C.4
-
26
-
-
79952371050
-
-
accessed August 16, 2010
-
Trusted Computing Group. http://www.trustedcomputinggroup.org, accessed August 16, 2010.
-
-
-
-
27
-
-
84870630391
-
-
accessed August 16, 2010
-
Trusted Platform Modules. http://www.trustedcomputinggroup.org/ developers/trusted-platform-module/specifications, accessed August 16, 2010.
-
Trusted Platform Modules
-
-
-
28
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer, "Secure coprocessor-based intrusion detection", Tenth ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002.
-
Tenth ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|