-
1
-
-
84863206169
-
-
Transmission and Distribution World, About 212 million smart electric meters in 2014, says ABI Research, February 3
-
Transmission and Distribution World, About 212 million smart electric meters in 2014, says ABI Research, February 3, 2010. http://tdworld.com/smart_grid_automation/abi-research-smart-meters-0210.
-
(2010)
-
-
-
2
-
-
84863204976
-
-
W32.Stuxnet dossier, symantec, mountain view, California
-
N. Falliere, L. O'Murchu, E. Chien, W32.Stuxnet dossier, symantec, mountain view, California, 2011. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
-
(2011)
-
-
Falliere, N.1
O'Murchu, L.2
Chien, E.3
-
3
-
-
80051478850
-
Was Stuxnet an act of war? decoding a cyberattack
-
Fidler D. Was Stuxnet an act of war? decoding a cyberattack. IEEE Security and Privacy 2011, 9(4):56-59.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.4
, pp. 56-59
-
-
Fidler, D.1
-
4
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction
-
X. Jiang, X. Wang, D. Xu, Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction, in: Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, 2007, pp. 128-138.
-
(2007)
in: Proceedings of the Fourteenth ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
5
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
L. Litty, H. Lagar-Cavilla, D. Lie, Hypervisor support for identifying covertly executing binaries, in: Proceedings of the Seventeenth USENIX Security Symposium, 2008, pp. 243-258.
-
(2008)
in: Proceedings of the Seventeenth USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.2
Lie, D.3
-
6
-
-
50249101677
-
Lares: an architecture for secure active monitoring using virtualization
-
B. Payne, M. Carbone, M. Sharif, W. Lee, Lares: an architecture for secure active monitoring using virtualization, in: Proceedings of the IEEE Symposium on Security and Privacy, pp. 233-247, 2008.
-
(2008)
in: Proceedings of the IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
8
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
R. Riley, X. Jiang, D. Xu, Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing, in: Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, 2008, pp. 1-20.
-
(2008)
in: Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
9
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W. Cui, P. Ning, Countering kernel rootkits with lightweight hook protection, in: Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, 2009, pp. 545-554.
-
(2009)
in: Proceedings of the Sixteenth ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
10
-
-
84863197060
-
-
Institute of Electrical and Electronics Engineers, IEEE 1646-2004 standard: communication delivery time performance requirements for electric power substation automation, Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE 1646-2004 standard: communication delivery time performance requirements for electric power substation automation, Piscataway, New Jersey, 2004.
-
(2004)
-
-
-
12
-
-
78751512625
-
VM-based security overkill: a lament for applied systems security research
-
S. Bratus, M. Locasto, A. Ramaswamy, S. Smith, VM-based security overkill: a lament for applied systems security research, in: Proceedings of the New Security Paradigms Workshop, 2010, pp. 51-60.
-
(2010)
in: Proceedings of the New Security Paradigms Workshop
, pp. 51-60
-
-
Bratus, S.1
Locasto, M.2
Ramaswamy, A.3
Smith, S.4
-
13
-
-
84863204979
-
-
PaX Team, Homepage.
-
PaX Team, Homepage. http://pax.grsecurity.net.
-
-
-
-
14
-
-
84863197061
-
-
Openwall, Linux kernel patch from the Openwall Project.
-
Openwall, Linux kernel patch from the Openwall Project. http://www.openwall.com/linux.
-
-
-
-
15
-
-
78751540942
-
Autoscopy: detecting pattern-searching rootkits via control flow tracing
-
Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire
-
A. Ramaswamy, Autoscopy: detecting pattern-searching rootkits via control flow tracing, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2009.
-
(2009)
-
-
Ramaswamy, A.1
-
16
-
-
84863206172
-
-
Autoscopy Jr.: intrusion detection for embedded control systems, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire
-
J. Reeves, Autoscopy Jr.: intrusion detection for embedded control systems, Master's Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2011.
-
(2011)
-
-
Reeves, J.1
-
17
-
-
84863204978
-
-
Kernel probes (Kprobes), The Linux Kernel Archives.
-
J. Keniston, P. Panchamukhi, M. Hiramatsu, Kernel probes (Kprobes), The Linux Kernel Archives. http://www.kernel.org/doc/Documentation/kprobes.txt.
-
-
-
Keniston, J.1
Panchamukhi, P.2
Hiramatsu, M.3
-
18
-
-
38149080457
-
Probing the guts of Kprobes
-
A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, M. Hiramatsu, Probing the guts of Kprobes, in: Proceedings of the Linux Symposium, vol. 2, 2006, pp.109-124.
-
(2006)
in: Proceedings of the Linux Symposium
, vol.2
, pp. 109-124
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
19
-
-
84863206173
-
-
Motorola Solutions, ACE3600 specifications sheet, Schaumburg, Illinois
-
Motorola Solutions, ACE3600 specifications sheet, Schaumburg, Illinois, 2009. http://www.motorola.com/web/Business/Products/SCADA%20Products/ACE3600/%5FDocuments/Static%20Files/ACE3600%20Specifications%20Sheet.pdf?pLibItem%3D1.
-
(2009)
-
-
-
20
-
-
84863195288
-
-
Schweitzer Engineering Laboratories, SEL-3354 embedded automation computing platform data sheet, Pullman, Washington
-
Schweitzer Engineering Laboratories, SEL-3354 embedded automation computing platform data sheet, Pullman, Washington, 2011. http://www.selinc.com/WorkArea/DownloadAsset.aspx?id%3D6196.
-
(2011)
-
-
-
21
-
-
84863197059
-
-
Secure network architecture for power grid control systems, Presented at the TCIPG Summer School on Cyber Security for Smart Energy Systems
-
A. Wright, Secure network architecture for power grid control systems, Presented at the TCIPG Summer School on Cyber Security for Smart Energy Systems, 2011.
-
(2011)
-
-
Wright, A.1
-
22
-
-
84863206171
-
-
Schweitzer Engineering Laboratories, Home, Pullman, Washington.
-
Schweitzer Engineering Laboratories, Home, Pullman, Washington. http://www.selinc.com.
-
-
-
-
24
-
-
84863204977
-
-
Mitre Corporation, CVE-2008-0923, Common vulnerabilities and exposures, Bedford, Massachusetts
-
Mitre Corporation, CVE-2008-0923, Common vulnerabilities and exposures, Bedford, Massachusetts, 2008. http://cve.mitre.org/cgi-bin/cvename.cgi?name%3DCVE-2008-0923.
-
(2008)
-
-
-
25
-
-
84863195287
-
-
Subverting the Xen hypervisor, Presented at Black Hat USA
-
R. Wojtczuk, Subverting the Xen hypervisor, Presented at Black Hat USA, 2008. http://www.invisiblethingslab.com/resources/bh08/part1.pdf.
-
(2008)
-
-
Wojtczuk, R.1
-
26
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. Hofmeyr, A. Somayaji, T. Longstaff, A sense of self for Unix processes, in: Proceedings of the IEEE Symposium on Security and Privacy, 1996, pp. 120-128.
-
(1996)
in: Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
27
-
-
85077019413
-
Dynamic instrumentation of production systems
-
B. Cantrill, M. Shapiro, A. Leventhal, Dynamic instrumentation of production systems, in: Proceedings of the USENIX Annual Technical Conference, 2004, pp. 15-28.
-
(2004)
in: Proceedings of the USENIX Annual Technical Conference
, pp. 15-28
-
-
Cantrill, B.1
Shapiro, M.2
Leventhal, A.3
-
28
-
-
84863206170
-
-
Overhead evaluation about Kprobe and Djprobe (direct jump probe)
-
M. Hiramatsu, Overhead evaluation about Kprobe and Djprobe (direct jump probe) 2005. http://lkst.sourceforge.net/docs/probes-eval-report.pdf.
-
(2005)
-
-
Hiramatsu, M.1
-
29
-
-
70349657264
-
Djprobe-Kernel probing with the smallest overhead
-
M. Hiramatsu, S. Oshima, Djprobe-Kernel probing with the smallest overhead, in: Proceedings of the Linux Symposium, vol. 1, 2007, pp. 189-200.
-
(2007)
in: Proceedings of the Linux Symposium
, vol.1
, pp. 189-200
-
-
Hiramatsu, M.1
Oshima, S.2
-
30
-
-
84863197057
-
-
Detection, prevention and containment: a study of grsecurity, Presented at the Libre Software Meeting
-
B. Spengler, Detection, prevention and containment: a study of grsecurity, Presented at the Libre Software Meeting, 2002.
-
(2002)
-
-
Spengler, B.1
-
31
-
-
84863195284
-
-
Wikibooks, Grsecurity/Overview.
-
Wikibooks, Grsecurity/Overview. http://en.wikibooks.org/wiki/Grsecurity/Overview.
-
-
-
-
32
-
-
84863195281
-
-
PaX Team, PaX-address space layout randomization.
-
PaX Team, PaX-address space layout randomization. http://pax.grsecurity.net/docs/aslr.txt.
-
-
-
-
33
-
-
84863204972
-
-
PaX Team, PaX-non-executable pages design and implementation.
-
PaX Team, PaX-non-executable pages design and implementation. http://pax.grsecurity.net/docs/noexec.txt.
-
-
-
-
34
-
-
84863197056
-
-
PaX Team, PaX-paging based non-executable pages.
-
PaX Team, PaX-paging based non-executable pages. http://pax.grsecurity.net/docs/pageexec.txt.
-
-
-
-
35
-
-
84863195285
-
-
Exploiting grsecurity/PaX with Dan Rosenberg and Jon Oberheide, May
-
T. Mittner, Exploiting grsecurity/PaX with Dan Rosenberg and Jon Oberheide, May 18, 2011. http://resources.infosecinstitute.com/exploiting-gresecuritypax.
-
(2011)
, vol.18
-
-
Mittner, T.1
-
36
-
-
84863197058
-
-
pragmatic/THC, (Nearly) complete Linux loadable kernel modules
-
pragmatic/THC, (Nearly) complete Linux loadable kernel modules, 1999. http://dl.packetstormsecurity.net/docs/hack/LKM_HACKING.html.
-
(1999)
-
-
-
37
-
-
84863204975
-
-
phrack.org, Phrack, No. 50., April
-
phrack.org, Phrack, No. 50., April 9, 2007. http://www.phrack.org/issues.html?issue%3D50.
-
(2007)
, vol.9
-
-
-
38
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou, X. Wang, Effective and efficient malware detection at the end host, in: Proceedings of the Eighteenth USENIX Security Symposium, 2009, pp. 351-366.
-
(2009)
in: Proceedings of the Eighteenth USENIX Security Symposium
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
39
-
-
34548017123
-
From trusted to secure: building and executing applications that enforce system security
-
B. Hicks, S. Rueda, T. Jaeger, P. McDaniel, From trusted to secure: building and executing applications that enforce system security, in: Proceedings of the USENIX Annual Technical Conference, 2007.
-
(2007)
in: Proceedings of the USENIX Annual Technical Conference
-
-
Hicks, B.1
Rueda, S.2
Jaeger, T.3
McDaniel, P.4
-
40
-
-
34547423144
-
Locating system problems using dynamic instrumentation
-
V. Prasad, W. Cohen, F. Eigler, M. Hunt, J. Keniston, B. Chen, Locating system problems using dynamic instrumentation, in: Proceedings of the Linux Symposium, 2005, pp. 49-64.
-
(2005)
in: Proceedings of the Linux Symposium
, pp. 49-64
-
-
Prasad, V.1
Cohen, W.2
Eigler, F.3
Hunt, M.4
Keniston, J.5
Chen, B.6
-
41
-
-
70449368201
-
Application-specific packet capturing using kernel probes
-
IEEE International Conference on Symposium on Integrated Network Management
-
B. Lee, S. Moon, Y. Lee, Application-specific packet capturing using kernel probes, in: Proceedings of the Eleventh IFIP/IEEE International Conference on Symposium on Integrated Network Management, 2009, pp. 303-306.
-
(2009)
in: Proceedings of the Eleventh IFIP
, pp. 303-306
-
-
Lee, B.1
Moon, S.2
Lee, Y.3
-
42
-
-
84863195282
-
-
The atom LEAP platform for energy-efficient embedded computing, Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California
-
D. Singh, W. Kaiser, The atom LEAP platform for energy-efficient embedded computing, Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California, 2010.
-
(2010)
-
-
Singh, D.1
Kaiser, W.2
-
43
-
-
84958770645
-
Lightweight intrusion detection for resource-constrained embedded control systems
-
Springer, Heidelberg, Germany, J. Butts, S. Shenoi (Eds.)
-
Reeves J., Ramaswamy A., Locasto M., Bratus S., Smith S. Lightweight intrusion detection for resource-constrained embedded control systems. Critical Infrastructure Protection V 2011, 31-46. Springer, Heidelberg, Germany. J. Butts, S. Shenoi (Eds.).
-
(2011)
Critical Infrastructure Protection V
, pp. 31-46
-
-
Reeves, J.1
Ramaswamy, A.2
Locasto, M.3
Bratus, S.4
Smith, S.5
-
44
-
-
33646767376
-
Control flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, Control flow integrity, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005, pp. 340-353.
-
(2005)
in: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
45
-
-
84863195283
-
-
SourceForge.net, Linux Test Project.
-
SourceForge.net, Linux Test Project. http://ltp.sourceforge.net.
-
-
-
-
46
-
-
42649119611
-
Execution path analysis: finding kernel based rootkits
-
Phrack, No.
-
J. Rutkowski, Execution path analysis: finding kernel based rootkits, Phrack, No. 59, 2002. http://www.phrack.com/issues.html?issue%3D59%26id%3D10.
-
(2002)
, vol.59
-
-
Rutkowski, J.1
-
47
-
-
84863197055
-
-
udis86 Disassembler Library for ×86 and ×
-
V. Thampi, udis86 Disassembler Library for ×86 and ×86-64, 2009. http://udis86.sf.net.
-
(2009)
, pp. 86-64
-
-
Thampi, V.1
-
48
-
-
0004287409
-
-
O'Reilly Media, Sebastopol, California
-
Corbet J., Rubini A., Kroah-Hartman G. Linux Device Drivers 2005, O'Reilly Media, Sebastopol, California.
-
(2005)
Linux Device Drivers
-
-
Corbet, J.1
Rubini, A.2
Kroah-Hartman, G.3
-
49
-
-
84863204974
-
-
Intel Corporation, Intel 64 and IA-32 architectures software developer's manual: instruction set reference, A-M, Santa Clara, California
-
Intel Corporation, Intel 64 and IA-32 architectures software developer's manual: instruction set reference, A-M, vol. 2A, Santa Clara, California, 2011.
-
(2011)
, vol.2
-
-
-
50
-
-
84863204973
-
-
FuSyS, KSTAT--kernel security therapy anti-trolls (2.4.x version) v1.1-2.
-
FuSyS, KSTAT--kernel security therapy anti-trolls (2.4.x version) v1.1-2. http://www.s0ftpj.org/en/tools.html.
-
-
-
-
51
-
-
4544282016
-
A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table
-
J. Levine, J. Grizzard, H. Owen, A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table, in: Proceedings of the Second IEEE International Information Assurance Workshop, 2004, pp. 107-125.
-
(2004)
in: Proceedings of the Second IEEE International Information Assurance Workshop
, pp. 107-125
-
-
Levine, J.1
Grizzard, J.2
Owen, H.3
-
52
-
-
84863197052
-
-
Detecting loadable kernel modules (LKM).
-
T. Miller, Detecting loadable kernel modules (LKM). http://www.s0ftpj.org/docs/lkm.htm.
-
-
-
Miller, T.1
-
54
-
-
84863197053
-
-
Standard Performance Evaluation Corporation, SPEC CPU2000 benchmark suite, Gainesville, Florida
-
Standard Performance Evaluation Corporation, SPEC CPU2000 benchmark suite, Gainesville, Florida, 2007. http://www.spec.org/cpu2000.
-
(2007)
-
-
-
56
-
-
84863206168
-
-
Open Source Security, grsecurity.
-
Open Source Security, grsecurity. http://grsecurity.net.
-
-
-
-
57
-
-
84863206167
-
-
Ftrace-Function Tracer, The Linux Kernel Archives.
-
S. Rostedt, Ftrace-Function Tracer, The Linux Kernel Archives. http://www.kernel.org/doc/Documentation/trace/ftrace.txt.
-
-
-
Rostedt, S.1
|