-
1
-
-
85084160641
-
The Flask security architecture: System support for diverse security policies
-
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J.: The Flask security architecture: system support for diverse security policies. In: Proceedings of the 8th USENIX Security Symposium, Washington, DC, pp. 123-139 (1999)
-
(1999)
Proceedings of the 8th USENIX Security Symposium, Washington, DC
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
5
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
-
Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 128-138 (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
6
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An architecture for secure active monitoring using virtualization. In: Proceedings of the 29th IEEE Symposiumon Security and Privacy, pp. 233-247 (2008)
-
(2008)
Proceedings of the 29th IEEE Symposiumon Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
7
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
Litty, L., Lagar-Cavilla, H.A., Lie, D.: Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th USENIX Security Symposium, pp. 243-258 (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
8
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
Sharif, M., Lee, W., Cui, W., Lanzi, A.: Secure in-VM monitoring using hardware virtualization. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 477-487 (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 477-487
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
11
-
-
84863971875
-
-
Tux.Org
-
Tux.Org (1996), http://www.tux.org/pub/tux/benchmarks/System/unixbench
-
(1996)
-
-
-
12
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering kernel rootkits with lightweight hook protection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 545-554 (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
13
-
-
84863920758
-
-
The Blue Pill Project, http://bluepillproject.org/
-
-
-
-
14
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: implementing malware with virtual machines. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)
-
Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
17
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 38-49 (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
19
-
-
79953172929
-
Selective hardware/software memory virtualization
-
Wang, X., Zang, J., Wang, Z., Luo, Y., Li, X.: Selective hardware/software memory virtualization. In: Proceedings of the 7th ACM Conference on Virtual Execution Environments, pp. 217-226 (2011)
-
(2011)
Proceedings of the 7th ACM Conference on Virtual Execution Environments
, pp. 217-226
-
-
Wang, X.1
Zang, J.2
Wang, Z.3
Luo, Y.4
Li, X.5
-
20
-
-
32044448588
-
Virtualization system including a virtual machine monitor for a computer with a segmented architecture
-
US Patent, 6397242
-
Devine, S., Bugnion, E., Rosenblum, M.: Virtualization system including a virtual machine monitor for a computer with a segmented architecture. US Patent, 6397242 (1998)
-
(1998)
-
-
Devine, S.1
Bugnion, E.2
Rosenblum, M.3
-
22
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Shuo, C., Xu, J., Sezer, E.C., Gauriar, P., lyer, R.K.: Non-control-data attacks are realistic threats. In: Proceedings of the 14th conference on USENIX Security Symposium (2005)
-
Proceedings of the 14th Conference on USENIX Security Symposium (2005)
-
-
Shuo, C.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Lyer, R.K.5
-
23
-
-
21644433634
-
Xen and the art of virtualization
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the Symposium on Operating System Principles (2003)
-
Proceedings of the Symposium on Operating System Principles (2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
24
-
-
84863884961
-
System Programming
-
Advanced Micro Devices. 3.12 edn.
-
Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.12 edn. (2006)
-
(2006)
AMD64 Architecture Programmer's Manual
, vol.2
-
-
|