-
1
-
-
0016518897
-
Efficient String Matching: An Aid to Bibliographic Search
-
A. V. Aho and M. J. Corasick. Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM, 18(6):333-340, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
2
-
-
80053150585
-
-
BitLocker Drive Encryption. http://windows.microsoft.com/en-US/windows7/ products/features/bitlocker.
-
BitLocker Drive Encryption
-
-
-
6
-
-
68249140232
-
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems
-
M. Hanaoka, M. Shimamura, and K. Kono. TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems. IEICE Transactions on Information and Systems, E90-D(12):2019-2032, 2007.
-
(2007)
IEICE Transactions on Information and Systems
, vol.E90-D
, Issue.12
, pp. 2019-2032
-
-
Hanaoka, M.1
Shimamura, M.2
Kono, K.3
-
7
-
-
77949441598
-
Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction
-
X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. ACM Transactions on Information and System Security, 13(2):12:1-12:28, 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
8
-
-
84863599055
-
-
LMbench. http://www.bitmover.com/lmbench/.
-
LMbench
-
-
-
9
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, pages 143-158, 2010.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
10
-
-
77950831023
-
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
-
A. M. Nguyen, N. Schear, H. Jung, A. Godiyal, S. T. King, and H. D. Nguyen. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. In Proceedings of the 2009 Annual Computer Security Applications Conference, pages 441-450, 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 441-450
-
-
Nguyen, A.M.1
Schear, N.2
Jung, H.3
Godiyal, A.4
King, S.T.5
Nguyen, H.D.6
-
11
-
-
50249101677
-
Lares: An Architecture for Secure Active Monitoring Using Virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An Architecture for Secure Active Monitoring Using Virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 233-247, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
12
-
-
85077741011
-
Storage-based Intrusion Detection: Watching storage activity for suspicious behavior
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. Soules, G. R. Goodson, and G. R. Ganger. Storage-based Intrusion Detection: Watching storage activity for suspicious behavior. In Proceedings of the 12th USENIX Security Symposium, pages 137-152, 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 137-152
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.4
Goodson, G.R.5
Ganger, G.R.6
-
13
-
-
56549083677
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
-
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008)
-
R. Riley, X. Jiang, and D. Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), volume 5230 of Lecture Notes in Computer Science, pages 1-20, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5230
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
14
-
-
70449824733
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of the 21st ACM Symposium on Operating Systems Principles, pages 335-350, 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
15
-
-
67650079952
-
BitVisor: A Thin Hypervisor for Enforcing I/O Device Security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. BitVisor: A Thin Hypervisor for Enforcing I/O Device Security. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE 2009), pages 121-130, 2009.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE 2009)
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
16
-
-
84902075936
-
-
Trend Micro. Deep Security. http://emea.trendmicro.com/emea/products/ enterprise/deep-security/.
-
Deep Security
-
-
-
18
-
-
84863579719
-
-
VMware. VMsafe. http://www.vmware.com/.
-
VMsafe
-
-
-
19
-
-
38349008410
-
Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage
-
Y. Zhang, Y. Gu, H. Wang, and D. Wang. Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage. In Proceedings of the 18th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD '06), pages 185-192, 2006.
-
(2006)
Proceedings of the 18th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD '06)
, pp. 185-192
-
-
Zhang, Y.1
Gu, Y.2
Wang, H.3
Wang, D.4
|