-
1
-
-
77957766305
-
Accelerating two-dimensional page walks for virtualized systems
-
ACM, New York
-
Bhargava, R., Serebrin, B., Spadini, F., Manne, S.: Accelerating two-dimensional page walks for virtualized systems. In: ASPLOS XIII: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 26-35. ACM, New York (2008)
-
(2008)
ASPLOS XIII: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 26-35
-
-
Bhargava, R.1
Serebrin, B.2
Spadini, F.3
Manne, S.4
-
2
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
Syverson, P., Jha, S. (eds.) ACM Press, New York
-
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, pp. 27-38. ACM Press, New York (2008)
-
(2008)
Proceedings of CCS 2008
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
3
-
-
78650032454
-
Return-oriented programming without returns
-
Keromytis, A., Shmatikov, V. (eds.) ACM Press, New York
-
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Keromytis, A., Shmatikov, V. (eds.) Proceedings of CCS 2010, pp. 559-572. ACM Press, New York (2010)
-
(2010)
Proceedings of CCS 2010
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.R.4
Shacham, H.5
Winandy, M.6
-
4
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008), Seattle, WA, USA (March 2008)
-
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2008), Seattle, WA, USA (March 2008)
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
5
-
-
0036041421
-
An empirical study of operating systems errors
-
ACM, New York
-
Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An empirical study of operating systems errors. In: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP 2001, pp. 73-88. ACM, New York (2001), http://doi.acm.org/10.1145/502034.502042
-
(2001)
Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP 2001
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
7
-
-
77957808684
-
The design and implementation of microdrivers
-
ACM, New York
-
Ganapathy, V., Renzelmann, M.J., Balakrishnan, A., Swift, M.M., Jha, S.: The design and implementation of microdrivers. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII, pp. 168-178. ACM, New York (2008), http://doi.acm.org/10.1145/1346281.1346303
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII
, pp. 168-178
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
8
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM, New York
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles, pp. 193-206. ACM, New York (2003)
-
(2003)
Proceedings of the 9th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
9
-
-
77952371831
-
-
Trusted Computing Group: Main Specification Version 1.2 rev. 85 February
-
Trusted Computing Group: TPM main specification. Main Specification Version 1.2 rev. 85 (February 2005)
-
(2005)
TPM Main Specification
-
-
-
11
-
-
80054850540
-
Malicious code injection via /dev/mem
-
March
-
Lineberry, A.: Malicious code injection via /dev/mem. In: Black Hat (March 2009)
-
(2009)
Black Hat
-
-
Lineberry, A.1
-
12
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
IEEE Computer Society, Washington, DC, USA
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: Efficient tcb reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 143-158. IEEE Computer Society, Washington, DC, USA (2010), http://dx.doi.org/10.1109/SP.2010.17
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
13
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: Proceedings of the ACM European Conference in Computer Systems (EuroSys) (April 2008)
-
Proceedings of the ACM European Conference in Computer Systems (EuroSys) (April 2008)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
15
-
-
85165835584
-
-
Mercenary
-
Mercenary: Kernel based keylogger (2002), http://goo.gl/7qwmr
-
(2002)
Kernel Based Keylogger
-
-
-
16
-
-
84949048331
-
Danuis - Dynamic device driver analysis based on virtual machine introspection
-
Neugschwandtner, M., Platzer, C., Comparetti, P.M., Bayer, U.: danuis - dynamic device driver analysis based on virtual machine introspection. In: Proceedings of the 7th Detection of Intrusions and Malware & Vulnerability Assessment (2010)
-
Proceedings of the 7th Detection of Intrusions and Malware & Vulnerability Assessment (2010)
-
-
Neugschwandtner, M.1
Platzer, C.2
Comparetti, P.M.3
Bayer, U.4
-
17
-
-
78751685688
-
Using a hypervisor to migrate running operating systems to secure virtual machines
-
Nomoto, T., Oyama, Y., Eiraku, H., Shingawa, T., Kato, K.: Using a hypervisor to migrate running operating systems to secure virtual machines. In: Proceedings of the 34th Annual IEEE Computer Software and Application Conference (2010)
-
Proceedings of the 34th Annual IEEE Computer Software and Application Conference (2010)
-
-
Nomoto, T.1
Oyama, Y.2
Eiraku, H.3
Shingawa, T.4
Kato, K.5
-
19
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE Computer Society, Washington, DC, USA
-
Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An architecture for secure active monitoring using virtualization. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 233-247. IEEE Computer Society, Washington, DC, USA (2008), http://portal.acm.org/citation.cfm?id=1397759. 1398072
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
21
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
ACM, New York
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In: Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335-350. ACM, New York (2007), http://doi.acm.org/10.1145/1294261.1294294
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
22
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Press, New York
-
Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, pp. 552-561. ACM Press, New York (2007)
-
(2007)
Proceedings of CCS 2007
, pp. 552-561
-
-
Shacham, H.1
-
23
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
Shi, E., Perrig, A., Doorn, L.V.: Bind: A fine-grained attestation service for secure distributed systems. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 154-168 (2005)
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Doorn, L.V.3
-
24
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing i/o device security
-
ACM, New York
-
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y., Kato, K.: Bitvisor: a thin hypervisor for enforcing i/o device security. In: Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2009, pp. 121-130. ACM, New York (2009), http://doi.acm.org/10.1145/1508293.1508311
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2009
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
25
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
ACM, New York
-
Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the reliability of commodity operating systems. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP 2003, pp. 207-222. ACM, New York (2003), http://doi.acm.org/10.1145/945445.945466
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP 2003
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
26
-
-
84904114872
-
PRECIP: Towards practical and retrofittable confidential information protection
-
Wang, X., Li, Z., Li, N., Choi, J.Y.: PRECIP: Towards practical and retrofittable confidential information protection. In: Proceedings of NDSS (2008)
-
Proceedings of NDSS (2008)
-
-
Wang, X.1
Li, Z.2
Li, N.3
Choi, J.Y.4
-
28
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering kernel rootkits with lightweight hook protection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 545-554 (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
30
-
-
34547699252
-
Concurrent direct network access for virtual machine monitors
-
Willmann, P., Shafer, J., Carr, D., Menon, A., Rixner, S., Cox, A.L., Zwaenepoel, W.: Concurrent direct network access for virtual machine monitors. In: Proceedings of the 13th International Symposium on High Performance Computer Architecture (2007)
-
Proceedings of the 13th International Symposium on High Performance Computer Architecture (2007)
-
-
Willmann, P.1
Shafer, J.2
Carr, D.3
Menon, A.4
Rixner, S.5
Cox, A.L.6
Zwaenepoel, W.7
-
31
-
-
23244459906
-
Trusted paths for browsers
-
Ye, Z.E., Smith, S., Anthony, D.: Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8(2), 153-186 (2005)
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.E.1
Smith, S.2
Anthony, D.3
-
32
-
-
84908296347
-
Safedrive: Safe and recoverable extensions using language-based techniques
-
USENIX Association, Berkeley acm.org/citation.cfm?id=1298455.1298461
-
Zhou, F., Condit, J., Anderson, Z., Bagrak, I., Ennals, R., Harren, M., Necula, G., Brewer, E.: Safedrive: safe and recoverable extensions using language-based techniques. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI 2006, pp. 45-60. USENIX Association, Berkeley (2006), http://portal.acm.org/citation.cfm?id=1298455.1298461
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI 2006
, pp. 45-60
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
|