-
1
-
-
85139866242
-
-
grsecurity. http://www. grsecurity. net/.
-
-
-
-
2
-
-
85139862704
-
-
Technical Report, Department of Computer Science, Virginia Tech
-
H. M. J. Almohri, D. Yao, and D. Kafura. Identifying native applications with high assurance. Technical Report, Department of Computer Science, Virginia Tech, 2011.
-
(2011)
Identifying native applications with high assurance
-
-
Almohri, H.M.J.1
Yao, D.2
Kafura, D.3
-
4
-
-
0011108312
-
Cryptographic Hash Functions
-
S. Axler, F. W. Gehring, and K. A. Ribet, editors. Springer New York
-
J. A. Buchmann and J. A. Buchmann. Cryptographic Hash Functions. In S. Axler, F. W. Gehring, and K. A. Ribet, editors, Introduction to Cryptography, Undergraduate Texts in Mathematics, pages 235-248. Springer New York, 2004.
-
(2004)
Introduction to Cryptography, Undergraduate Texts in Mathematics
, pp. 235-248
-
-
Buchmann, J.A.1
Buchmann, J.A.2
-
5
-
-
27544433210
-
Semantics-aware malware detection
-
may
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 32-46, may 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
7
-
-
84858758065
-
Vx32: lightweight user-level sandboxing on the x86
-
Berkeley, CA, USA. USENIX Association
-
B. Ford and R. Cox. Vx32: lightweight user-level sandboxing on the x86. In Proceedings of the 2008 USENIX Annual Technical Conference, pages 293-306, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 2008 USENIX Annual Technical Conference
, pp. 293-306
-
-
Ford, B.1
Cox, R.2
-
11
-
-
33748062337
-
PRIMA: policy-reduced integrity measurement architecture
-
New York, NY, USA. ACM
-
T. Jaeger, R. Sailer, and U. Shankar. PRIMA: policy-reduced integrity measurement architecture. In Proceedings of the 11th ACM symposium on Access control models and technologies, SACMAT '06, pages 19-28, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 11th ACM symposium on Access control models and technologies, SACMAT '06
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
14
-
-
84889023382
-
Making Linux protection mechanisms egalitarian with UserFS
-
Berkeley, CA, USA. USENIX Association
-
T. Kim and N. Zeldovich. Making Linux protection mechanisms egalitarian with UserFS. In Proceedings of the 19th USENIX conference on Security, pages 13-27, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 19th USENIX conference on Security
, pp. 13-27
-
-
Kim, T.1
Zeldovich, N.2
-
15
-
-
79951741845
-
A VMM-based system call interposition framework for program monitoring
-
Washington, DC, USA. IEEE Computer Society
-
B. Li, J. Li, T. Wo, C. Hu, and L. Zhong. A VMM-based system call interposition framework for program monitoring. In Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, ICPADS '10, pages 706-711, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, ICPADS '10
, pp. 706-711
-
-
Li, B.1
Li, J.2
Wo, T.3
Hu, C.4
Zhong, L.5
-
17
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
Berkeley, CA. USENIX Association
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proceedings of the 2001 USENIX Annual Technical Conference, Berkeley, CA, 2001. USENIX Association.
-
(2001)
Proceedings of the 2001 USENIX Annual Technical Conference
-
-
Loscocco, P.1
Smalley, S.2
-
18
-
-
78650002259
-
BLADE: An attack-agnostic approach for preventing drive-by malware infections
-
New York, NY, USA. ACM
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. BLADE: An attack-agnostic approach for preventing drive-by malware infections. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 440-450, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security, CCS '10
, pp. 440-450
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
19
-
-
85084160699
-
lmbench: portable tools for performance analysis
-
Berkeley, CA, USA. USENIX Association
-
L. McVoy and C. Staelin. lmbench: portable tools for performance analysis. In Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, pages 23-23, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
, pp. 23-23
-
-
McVoy, L.1
Staelin, C.2
-
21
-
-
60749118885
-
A practical mimicry attack against powerful system-call monitors
-
New York, NY, USA. ACM
-
C. Parampalli, R. Sekar, and R. Johnson. A practical mimicry attack against powerful system-call monitors. In Proceedings of the 2008 ACM symposium on Information, computer and communications security, ASIACCS '08, pages 156-167, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM symposium on Information, computer and communications security, ASIACCS '08
, pp. 156-167
-
-
Parampalli, C.1
Sekar, R.2
Johnson, R.3
-
22
-
-
33748096602
-
System call monitoring using authenticated system calls
-
July
-
M. Rajagopalan, M. A. Hiltunen, T. Jim, and R. D. Schlichting. System call monitoring using authenticated system calls. IEEE Transactions on Dependable and Secure Computing, 3: 216-229, July 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, pp. 216-229
-
-
Rajagopalan, M.1
Hiltunen, M.A.2
Jim, T.3
Schlichting, R.D.4
-
23
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Berlin, Heidelberg, Springer-Verlag
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, N. James, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In Proceedings of the 4th International Conference on Information Systems Security, ICISS'08, pages 1-25, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security, ICISS'08
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
James, N.8
Poosankam, P.9
Saxena, P.10
-
24
-
-
84898990489
-
Knowing where your input is from: Kernel-level provenance verification
-
Springer-Verlag
-
D. Stefan, C. Wu, D. Yao, and G. Xu. Knowing where your input is from: Kernel-level provenance verification. In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS), pages 71-87. Springer-Verlag, 2010.
-
(2010)
Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS)
, pp. 71-87
-
-
Stefan, D.1
Wu, C.2
Yao, D.3
Xu, G.4
-
25
-
-
34548038158
-
Authorizing applications in singularity
-
New York, NY, USA. ACM
-
T. Wobber, A. Yumerefendi, M. Abadi, A. Birrell, and D. R. Simon. Authorizing applications in singularity. In Proceedings of the 2nd European Conference on Computer Systems, EuroSys '07, pages 355-368, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2nd European Conference on Computer Systems, EuroSys '07
, pp. 355-368
-
-
Wobber, T.1
Yumerefendi, A.2
Abadi, M.3
Birrell, A.4
Simon, D.R.5
-
26
-
-
32344450199
-
Linux security module framework
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security module framework. In Proceedings of the 11th Ottawa Linux Symposium, 2002.
-
(2002)
Proceedings of the 11th Ottawa Linux Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|