-
1
-
-
33646767376
-
Control-flow integrity
-
New York, NY, USA. ACM
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05, pages 340-353, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), Nov 1996. 289
-
(1996)
Phrack
, vol.7
, Issue.49
, pp. 289
-
-
One, A.1
-
3
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Washington, DC, USA. IEEE Computer Society
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 65, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 65
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
4
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data (short paper)
-
DOI 10.1109/SP.2007.25, 4223229, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
A. Baliga, P. Kamat, and L. Iftode. Lurking in the shadows: Identifying systemic threats to kernel data. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP '07, pages 246-251, Washington, DC, USA, 2007. IEEE Computer Society. (Pubitemid 47432531)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A.Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pages 164-177, New York, NY, USA, 2003. ACM. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
85084162449
-
The slab allocator: An object-caching kernel memory allocator
-
Berkeley, CA, USA, USENIX Association
-
J. Bonwick. The slab allocator: an object-caching kernel memory allocator. In Proceedings of the USENIX Summer 1994 Technical Conference, pages 6-6, Berkeley, CA, USA, 1994. USENIX Association.
-
(1994)
Proceedings of the USENIX Summer 1994 Technical Conference
, pp. 6-6
-
-
Bonwick, J.1
-
8
-
-
85062418620
-
Non-controldata attacks are realistic threats
-
Berkeley, CA, USA. USENIX Association
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-controldata attacks are realistic threats. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, pages 12-12, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 12-12
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
9
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
DOI 10.1145/1346281.1346284, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, ASPLOS XIII, pages 2-13, New York, NY, USA, 2008. ACM. (Pubitemid 351585389)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
10
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Berkeley, CA, USA. USENIX Association
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J.Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, pages 5-5, Berkeley, CA, USA, 1998. USENIX Association.
-
(1998)
Proceedings of the 7th Conference on USENIX Security Symposium
, vol.7
, pp. 5-5
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
11
-
-
76749136584
-
Digging for data structures
-
Berkeley, CA, USA. USENIX Association
-
A. Cozzie, F. Stratton, H. Xue, and S. T. King. Digging for data structures. In Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, pages 255-266, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08
, pp. 255-266
-
-
Cozzie, A.1
Stratton, F.2
Xue, H.3
King, S.T.4
-
12
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pages 193-206, New York, NY, USA, 2003. ACM. (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
36849034066
-
SPEC CPU2006 benchmark descriptions
-
J. L. Henning. SPEC CPU2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34(4):1-17, 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, Issue.4
, pp. 1-17
-
-
Henning, J.L.1
-
16
-
-
0023964787
-
SCALE AND PERFORMANCE IN A DISTRIBUTED FILE SYSTEM.
-
DOI 10.1145/35037.35059
-
J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, M. Satyanarayanan, R. N. Sidebotham, and M. J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6:51-81, February 1988. (Pubitemid 18574134)
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard John, H.1
Kazar Michael, L.2
Menees Sherri, G.3
Nichols David4
Satyanarayanan, M.5
Sidebotham Robert, N.6
West Michael, J.7
-
17
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Berkeley, CA, USA. USENIX Association
-
R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 383-398, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
21
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
New York, NY, USA, ACM
-
P. A. Loscocco, P. W. Wilson, J. A. Pendergrass, and C. D. McDonell. Linux kernel integrity measurement using contextual inspection. In Proceedings of the 2007 ACM workshop on Scalable trusted computing, STC '07, pages 21-29, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC '07
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
22
-
-
84959039613
-
Cil: Intermediate language and tools for analysis and transformation of c programs
-
London, UK. Springer Verlag
-
G. C. Necula, S. McPeak, S. P. Rahul, and W. Weimer. Cil: Intermediate language and tools for analysis and transformation of c programs. In Proceedings of the 11th International Conference on Compiler Construction, CC '02, pages 213-228, London, UK, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 11th International Conference on Compiler Construction, CC '02
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
23
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
New York, NY, USA. ACM
-
N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 103-115, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 103-115
-
-
Petroni Jr., N.L.1
Hicks, M.2
-
24
-
-
72249089012
-
Operating system transactions
-
New York, NY, USA, ACM
-
D. E. Porter, O. S. Hofmann, C. J. Rossbach, A. Benn, and E.Witchel. Operating system transactions. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09, pages 161-176, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP '09
, pp. 161-176
-
-
Porter, D.E.1
Hofmann, O.S.2
Rossbach, C.J.3
Benn, A.4
Witchel, E.5
-
25
-
-
70349665533
-
Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring
-
J. Rhee, R. Riley, D. Xu, and X. Jiang. Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring. International Conference on Availability, Reliability and Security, 0:74-81, 2009.
-
(2009)
International Conference on Availability, Reliability and Security
, pp. 74-81
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
26
-
-
79953077353
-
Linux kernel backdoors and their detection
-
Oct
-
J. Rutkowska. Linux kernel backdoors and their detection. In ITUnderground, Oct 2004.
-
(2004)
ITUnderground
-
-
Rutkowska, J.1
-
27
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 335-350, New York, NY, USA, 2007. ACM. (Pubitemid 351429386)
-
(2007)
Operating Systems Review (ACM)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
-
New York, NY, USA, ACM
-
H. Shacham. The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 552-561, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 552-561
-
-
Shacham, H.1
-
31
-
-
77952371831
-
-
Trusted Computing Group
-
Trusted Computing Group. TPM Main Specification, 2007. http://www.trustedcomputinggroup.org/resources/tpm-main-specification.
-
(2007)
TPM Main Specification
-
-
-
32
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
New York, NY, USA. ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 545-554, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
33
-
-
79953076765
-
-
D. Wheeler. SLOCCount. http://www.dwheeler.com/sloccount/,2001.
-
(2001)
-
-
|