-
1
-
-
80755144085
-
-
[last accessed: May 2011]
-
Kaiten. http://packetstormsecurity.org/irc/kaiten.c. [last accessed: May 2011].
-
Kaiten
-
-
-
2
-
-
84881267822
-
-
[last accessed: May 2011]
-
Kernel Virtual Machine. http://www.linux-kvm.org. [last accessed: May 2011].
-
Kernel Virtual Machine
-
-
-
3
-
-
80755188358
-
-
[last accessed: May 2011]
-
McAfee Threats Report: Fourth Quarter 2010. http://www.mcafee.com/us/ resources/reports/rp-quarterly-threat-q4-2010.pdf. [last accessed: May 2011].
-
(2010)
-
-
-
4
-
-
80755144086
-
-
[last accessed: May 2011]
-
QEMU. http://www.qemu.org. [last accessed: May 2011].
-
-
-
-
7
-
-
80755144084
-
AMD-V nested paging
-
AMD
-
AMD. AMD-V Nested Paging. AMD White Paper (2008).
-
(2008)
AMD White Paper
-
-
-
8
-
-
77950820630
-
HIMA: A hypervisor-based integrity measurement agent
-
AZAB, A. M., NING, P., SEZER, E. C., AND ZHANG, X. HIMA: A Hypervisor-Based Integrity Measurement Agent. In Proceedings of the 25th Annual Computer Security Applications Conference (2009).
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
10
-
-
80755174232
-
Stealthy deployment and execution of in-guest kernel agents
-
CKER CHIUEH, T., CONOVER, M., LU, M., AND MONTAGUE, B. Stealthy Deployment and Execution of In-Guest Kernel Agents. In BlackHat 2009.
-
BlackHat 2009
-
-
Cker Chiueh, T.1
Conover, M.2
Lu, M.3
Montague, B.4
-
11
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
DINABURG, A., ROYAL, P., SHARIF, M., AND LEE, W. Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (2008).
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
12
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
DOLAN-GAVITT, B., LEEK, T., ZHIVICH, M., GIFFIN, J., AND LEE, W. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (2011).
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
16
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker. In Proceedings of the 6th USENIX Security Symposium (1996).
-
(1996)
Proceedings of the 6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
18
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
INTEL
-
INTEL. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel(R) Technology Journal 10, 3 (2006).
-
(2006)
Intel(R) Technology Journal
, vol.10
, pp. 3
-
-
-
22
-
-
80755188357
-
Process implanting: A new active introspection framework for virtualization
-
Gu, Z., DENG, Z., XU, D., AND JIANG, X. Process Implanting: A New Active Introspection Framework for Virtualization. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (2011).
-
(2011)
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems
-
-
Gu, Z.1
Deng, Z.2
Xu, D.3
Jiang, X.4
-
23
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
JOSHI, A., KING, S. T., DUNLAP, G. W., AND CHEN, P. M. Detecting Past and Present Intrusions through Vulnerability-specific Predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (2005).
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
25
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., AND WINWOOD, S. seL4: Formal Verification of an OS Kernel. In Proceedings of the 22nd Symposium on Operating Systems Principles (2009).
-
(2009)
Proceedings of the 22nd Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
26
-
-
48649084773
-
OmniUnpack: Fast, generic, and safe unpacking of malware
-
MARTIGNONI, L., CHRISTODORESCU, M., AND JHA, S. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In Proceedings of the 23rd Annual Computer Security Applications Conference (2007).
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
28
-
-
0038214863
-
A brief survey of systems providing process or object migration facilities
-
NUTTALL, M. A Brief Survey of Systems Providing Process or Object Migration Facilities. ACM SIGOPS Operating Systems Review 28 (1994).
-
(1994)
ACM SIGOPS Operating Systems Review
, vol.28
-
-
Nuttall, M.1
-
29
-
-
84978437417
-
The design and implementation of zap: A system for migrating computing environments
-
OSMAN, S., SUBHRAVETI, D., SU, G., AND NIEH, J. The Design and Implementation of Zap: a System for Migrating Computing Environments. ACM SIGOPS Operating Systems Review 36 (2002).
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
31
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
PAYNE, B. D., CARBONE, M., SHARIF, M., AND LEE, W. Lares: An Architecture for Secure Active Monitoring Using Virtualization. In Proceedings of the 29th IEEE Symposium on Security and Privacy (2008).
-
(2008)
Proceedings of the 29th IEEE Symposium on Security and Privacy
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
33
-
-
34748820878
-
PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
-
ROYAL, P., HALPIN, M., DAGON, D., EDMONDS, R., AND LEE, W. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In Proceedings of the 22nd Annual Computer Security Applications Conference (2006).
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
34
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
SHARIF, M. I., LEE, W., CUI, W., AND LANZI, A. Secure In-VM Monitoring Using Hardware Virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
36
-
-
12344277946
-
The design and implementation of berkeley lab's linux checkpoint/Restart
-
SMITH, J. M. The Design and Implementation of Berkeley Lab's Linux Checkpoint/Restart. Berkeley Lab Technical Report (2002).
-
(2002)
Berkeley Lab Technical Report
-
-
Smith, J.M.1
|