-
1
-
-
78650574143
-
DKSM: Subverting virtual machine introspection for fun and profit
-
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu. DKSM: Subverting virtual machine introspection for fun and profit. IEEE Symposium on Reliable Distributed Systems, 2010.
-
(2010)
IEEE Symposium on Reliable Distributed Systems
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM Symposium on Operating System Principles (SOSP), 2003.
-
(2003)
ACM Symposium on Operating System Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
3
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
San Diego, CA
-
U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauscheck, C.3
Kruegel, C.4
Kirda, E.5
-
5
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
San Diego, CA
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, 2010.
-
(2010)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
6
-
-
84861443711
-
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
-
Montreal, Canada
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In Electronic Voting Technology / Workshop on Trustworthy Elections (EVT/WOTE), Montreal, Canada, 2009.
-
(2009)
Electronic Voting Technology / Workshop on Trustworthy Elections (EVT/WOTE)
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
7
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Alexandria, VA
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In ACM Computer and Communications Security, Alexandria, VA, 2008.
-
(2008)
ACM Computer and Communications Security
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
8
-
-
74049118754
-
Robust signatures for kernel data structures
-
Chicago, IL
-
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In ACM Computer and Communications Security (CCS), Chicago, IL, 2009.
-
(2009)
ACM Computer and Communications Security (CCS)
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
10
-
-
85180527583
-
Traps and pitfalls: Practical problems in in system call interposition based security tools
-
San Diego, CA
-
T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, 2003.
-
(2003)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Garfinkel, T.1
-
12
-
-
85177685684
-
-
Haiku OS project. http://haiku-os.org/.
-
-
-
-
13
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box," semantic view reconstruction
-
Alexandria, VA
-
X. Jiang, D. Xu, and X. Wang. Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction. In ACM Computer and Communications Security (CCS), Alexandria, VA, 2007.
-
(2007)
ACM Computer and Communications Security (CCS)
-
-
Jiang, X.1
Xu, D.2
Wang, X.3
-
15
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
Montreal, Canada
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX Security Symposium, Montreal, Canada, 2009.
-
(2009)
USENIX Security Symposium
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
16
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
Oakland, CA
-
C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda. Inspector Gadget: Automated extraction of proprietary gadgets from malware binaries. In IEEE Symposium on Security and Privacy, Oakland, CA, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
22
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
Washington, D.C
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In ACM Computer and Communications Security (CCS), Washington, D.C., 2003.
-
(2003)
ACM Computer and Communications Security (CCS)
-
-
Linn, C.1
Debray, S.2
-
23
-
-
85177690425
-
-
Microsoft Corporation. RtlAllocateHeap on MSDN. http://msdn.microsoft. com/en-us/library/ff552108(VS.85).aspx.
-
RtlAllocateHeap on MSDN
-
-
-
24
-
-
84874245230
-
-
Microsoft Corporation. Windows research kernel. http://www.microsoft.com/ resources/sharedsource/windowsacademic/researchkernelkit.mspx.
-
Windows Research Kernel
-
-
-
25
-
-
85177674685
-
-
Mission Critical Linux. Core analysis suite (crash). http://www. missioncriticallinux.com/projects/crash/.
-
Core Analysis Suite (crash)
-
-
-
27
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In IEEE Symposium on Security and Privacy, Oakland, CA, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
28
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
San Diego, CA
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security Symposium, San Diego, CA, 2004.
-
(2004)
USENIX Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
29
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Alexandria, VA
-
H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In ACM Computer and Communications Security (CCS), Alexandria, VA, 2007.
-
(2007)
ACM Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
33
-
-
79960481357
-
Countering persistent kernel rootkits through systematic hook discovery
-
Cambridge, MA
-
Z. Wang, X. Jiang, W. Cui, and X. Wang. Countering persistent kernel rootkits through systematic hook discovery. In Recent Advances in Intrusion Detection, Cambridge, MA, 2008.
-
(2008)
Recent Advances in Intrusion Detection
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
34
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
March
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using CWSandbox. IEEE Security & Privacy, 5(2), March 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
|