-
1
-
-
84872098996
-
-
OKl4 microvisor. http://www.ok-labs.com/products/okl4-microvisor.
-
OKl4 Microvisor
-
-
-
4
-
-
75249095299
-
-
April MacAfee AVERT Labs Whitepaper
-
Rootkits, Part 1 of 3: A Growing Threat. http://download.nai.com/ Products/mcafee-avert/whitepapers/akapoor-rootkits1.pdf, April 2006. MacAfee AVERT Labs Whitepaper.
-
(2006)
Rootkits, Part 1 of 3: A Growing Threat
-
-
-
5
-
-
79960545596
-
-
December MacAfee AVERT Labs Whitepaper
-
2010 threat predictions. http://www.mcafee.com/us/resources/reports/rp- threat-predictions-2010.pdf, December 2009. MacAfee AVERT Labs Whitepaper.
-
(2009)
2010 Threat Predictions
-
-
-
7
-
-
84856110053
-
-
ARM. Cortex-a9 processor. http://www.arm.com/products/processors/cortex- a/cortex-a9.php.
-
Cortex-a9 Processor
-
-
-
13
-
-
21644433634
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In In Proc. 19th ACM Symposium on Operating Systems Principles, 2003.
-
Proc. 19th ACM Symposium on Operating Systems Principles, 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
14
-
-
77951566629
-
Rootkits on Smart Phones: Attacks, Implications and Opportunities
-
J. Bickford, R. OH´are, A. Baliga, V. Gannapathy, and L. Iftode. Rootkits on Smart Phones: Attacks, Implications and Opportunities. In Proc. Workshop on Mobile Computing Systems and Applications, February 2010.
-
Proc. Workshop on Mobile Computing Systems and Applications, February 2010
-
-
Bickford, J.1
OH́are, R.2
Baliga, A.3
Gannapathy, V.4
Iftode, L.5
-
16
-
-
85062418620
-
Non-control-data Attacks Are Realistic Threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data Attacks Are Realistic Threats. In Proc. USENIX Security Symposium, August 2005.
-
Proc. USENIX Security Symposium, August 2005
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
18
-
-
77954993714
-
MAUI: Making Smartphones Last Longer with Code Offoad
-
E. Cuervo and A. Balasubramanian and D. Cho and A. Wolman and S. Saroiu and R. Chandra and P. Bahl. MAUI: Making Smartphones Last Longer with Code Offoad. In Proc. 8th Conference onMobile Systems, Applications and Service, June 2010.
-
Proc. 8th Conference OnMobile Systems, Applications and Service, June 2010
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
20
-
-
34548087556
-
-
Science of Computer Programming
-
M. Ernst, J. Perkins, P. Guo, S. McCamant, C. Pacheco, M. Tschantz, and C. Xiao. The Daikon System for Dynamic Detection of Likely Invariants. In Science of Computer Programming, 2006.
-
(2006)
The Daikon System for Dynamic Detection of Likely Invariants
-
-
Ernst, M.1
Perkins, J.2
Guo, P.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.6
Xiao, C.7
-
24
-
-
84884642012
-
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
-
M. Grace, Z. Wang, D. Srinivasan, J. Li, X. Jiang, Z. Liang, and S. Liakh. Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. In Proc. 6th Conference on Security and Privacy in Communication Networks, 2010.
-
Proc. 6th Conference on Security and Privacy in Communication Networks, 2010
-
-
Grace, M.1
Wang, Z.2
Srinivasan, D.3
Li, J.4
Jiang, X.5
Liang, Z.6
Liakh, S.7
-
25
-
-
79953070187
-
Ensuring operating system kernel integrity with osck
-
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with osck. In Proc. 16th Conference on Architectural Support for Programming Languages and Operating Systems, March 2011.
-
Proc. 16th Conference on Architectural Support for Programming Languages and Operating Systems, March 2011
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
26
-
-
51949098506
-
Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones
-
J. Hwang, S. Suh, S. Heo, C. Park, J. Ryu, S. Park, and C. Kim. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones. In Consumer Communications and Networking Conference, January 2008.
-
Consumer Communications and Networking Conference, January 2008
-
-
Hwang, J.1
Suh, S.2
Heo, S.3
Park, C.4
Ryu, J.5
Park, S.6
Kim, C.7
-
29
-
-
72249120603
-
seL4: Formal Verification of an OS Kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal Verification of an OS Kernel. In Proc. 22nd ACM Symposium on Operating Systems Principles, October 2009.
-
Proc. 22nd ACM Symposium on Operating Systems Principles, October 2009
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
31
-
-
79961042145
-
-
LWN.net. lwn.net/Articles/75990
-
LWN.net. A New Adore Root Kit. lwn.net/Articles/75990/.
-
A New Adore Root Kit
-
-
-
32
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proc. European Conference on Computer Systems, April 2008.
-
Proc. European Conference on Computer Systems, April 2008
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
35
-
-
79961081271
-
-
August
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. 10(3), August 2006.
-
(2006)
Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization
, vol.10
, Issue.3
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
37
-
-
77956609298
-
Virtualized In-Cloud Security Services for Mobile Devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized In-Cloud Security Services for Mobile Devices. In Proc. Workshop on Virtualization in Mobile Computing, June 2008.
-
Proc. Workshop on Virtualization in Mobile Computing, June 2008
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
44
-
-
77952351839
-
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
-
October
-
H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proc. ACM Conference on Computer and Communications Security, pages 552-561, October 2007.
-
(2007)
Proc. ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
47
-
-
77954517653
-
Secure Coprocessor-based Intrusion Detection
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer. Secure Coprocessor-based Intrusion Detection. In Proc. 10th workshop on ACM SIGOPS European workshop: beyond the PC, 2002.
-
Proc. 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC, 2002
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|