-
1
-
-
79955961113
-
Feature consistency in compile-time configurable system software
-
R. Tartler, D. Lohmann, J. Sincero, and W. Schroder-Preikschat, "Feature Consistency in Compile-Time Configurable System Software, " in Proceedings of the 2011 EuroSys Conference (EuroSys '11), 2011.
-
(2011)
Proceedings of the 2011 EuroSys Conference (EuroSys '11)
-
-
Tartler, R.1
Lohmann, D.2
Sincero, J.3
Schroder-Preikschat, W.4
-
2
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries, " in Proceedings of the 2010 Annual Computer Security Applications Conference, 2010.
-
(2010)
Proceedings of the 2010 Annual Computer Security Applications Conference
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
3
-
-
38149080457
-
Probing the guts of kprobes
-
A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, and M. Hiramatsu, "Probing the Guts of Kprobes, " in Proceedings of the 2006 Linux Symposium, 2006.
-
(2006)
Proceedings of the 2006 Linux Symposium
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
5
-
-
33745203746
-
System-wide compaction and specialization of the linux kernel
-
D. Chanet, B. De Sutter, B. De Bus, L. Van Put, and K. De Bosschere, "System-wide Compaction and Specialization of the Linux Kernel, " ACM SIGPLAN Notices, 2005.
-
(2005)
ACM SIGPLAN Notices
-
-
Chanet, D.1
De Sutter, B.2
De Bus, B.3
Van Put, L.4
De Bosschere, K.5
-
7
-
-
85084162735
-
A secure environment for untrusted helper applications confining the wily hacker
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, "A Secure Environment for Untrusted Helper Applications Confining the Wily Hacker, " in Proceedings of the 6th USENIX Security Symposium, 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
8
-
-
33947108834
-
Chakravyuha: A sandbox operating system for the controlled execution of alien code
-
A. Dan, A. Mohindra, R. Ramaswami, and D. Sitaram, "Chakravyuha: A Sandbox Operating System for the Controlled Execution of Alien Code, " tech. rep., IBM TJ Watson research center, 1997.
-
(1997)
Tech. Rep., IBM TJ Watson Research Center
-
-
Dan, A.1
Mohindra, A.2
Ramaswami, R.3
Sitaram, D.4
-
11
-
-
79957808129
-
-
SELinux. http://selinuxproject.org/page/.
-
SELinux
-
-
-
12
-
-
79957814212
-
-
TOMOYO. http://tomoyo.sourceforge.jp/.
-
TOMOYO
-
-
-
13
-
-
79957873635
-
-
grsecurity. http://grsecurity.net/.
-
Grsecurity
-
-
-
14
-
-
33745201000
-
Anomalous system call detection
-
February
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel, "Anomalous System Call Detection, " ACM Transactions on Information and System Security, pp. 61-93, February 2006.
-
(2006)
ACM Transactions on Information and System Security
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
17
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. Petroni Jr, T. Fraser, J. Molina, and W. Arbaugh, "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor, " in Proceedings of the 13th USENIX Security Symposium, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Petroni Jr., N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.4
-
18
-
-
74049133176
-
Cloud security is not (Just) virtualization security
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud Security Is Not (Just) Virtualization Security, " in Proceedings of the 2009 ACM workshop on Cloud Computing Security (CCSW '09), 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW '09)
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
19
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports, "Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, " in Proceedings of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), 2008.
-
(2008)
Proceedings of the 13th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
20
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An Architecture for Secure Active Monitoring Using Virtualization, " in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
21
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
M. I. Sharif, W. Lee, W. Cui, and A. Lanzi, "Secure In-VM Monitoring Using Hardware Virtualization, " in Proceedings of the 16th Computer and Communications Security Conference (CCS '09), 2009.
-
(2009)
Proceedings of the 16th Computer and Communications Security Conference (CCS '09)
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
|