메뉴 건너뛰기




Volumn , Issue , 2012, Pages 471-478

Maitland: Lighter-weight VM introspection to support cyber-security in the cloud

Author keywords

clouds; malware; VM introspection

Indexed keywords

CLOSE INTEGRATION; CYBER SECURITY; HYPERVISOR; MALICIOUS SOFTWARE; MALWARE DETECTION; MALWARES; PARAVIRTUALIZATION; PROOF OF CONCEPT; RUNTIMES; SECURITY AND PRIVACY ISSUES; VIRTUAL MACHINES; VM INTROSPECTION;

EID: 84866766411     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2012.145     Document Type: Conference Paper
Times cited : (33)

References (40)
  • 2
    • 52149092178 scopus 로고    scopus 로고
    • The evolution of commercial malware development kits and colour-by-numbers custom malware
    • [Online]. Available
    • Gunter and Ollmann, "The evolution of commercial malware development kits and colour-by-numbers custom malware," Computer Fraud and Security, vol. 2008, no. 9, pp. 4-7, 2008. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S1361372308701350
    • (2008) Computer Fraud and Security , vol.2008 , Issue.9 , pp. 4-7
    • Gunter1    Ollmann2
  • 5
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • ser. CCS '09. New York, NY, USA: ACM, [Online]. Available
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 199-212. [Online]. Available: http://doi.acm.org/10.1145/1653662.1653687
    • (2009) Proceedings of the 16th ACM Conference on Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 6
    • 34047110218 scopus 로고    scopus 로고
    • Toward Automated Dynamic Malware Analysis Using CWSandbox
    • Mar.
    • C. Willems, T. Holz, and F. Freiling, "Toward Automated Dynamic Malware Analysis Using CWSandbox," IEEE Security and Privacy Magazine, vol. 5, no. 2, pp. 32-39, Mar. 2007.
    • (2007) IEEE Security and Privacy Magazine , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 8
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based out-of-the-box" semantic view reconstruction
    • ser. CCS '07. New York, NY, USA: ACM, [Online]. Available
    • X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 128-138. [Online]. Available: http://doi.acm.org/10.1145/1315245.1315262
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 9
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware Analysis via Hardware Virtualization Extensions
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether : Malware Analysis via Hardware Virtualization Extensions," Analysis, pp. 51-62, 2008.
    • (2008) Analysis , pp. 51-62
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 11
    • 48649089436 scopus 로고    scopus 로고
    • Improving proactive detection of packed malware
    • no. March
    • A. Stepan, "Improving proactive detection of packed malware." Virus Bulletin, vol. 1, no. March, 2006.
    • (2006) Virus Bulletin , vol.1
    • Stepan, A.1
  • 17
    • 84866766475 scopus 로고    scopus 로고
    • Kaspersky, "Virus.Win32.Sality.bh," 2011, http://www. securelist.com/en/descriptions/15312802/Virus.Win32.Sality.bh\#doc1.
    • (2011) Virus.Win32.Sality.bh
    • Kaspersky1
  • 18
    • 84866766472 scopus 로고    scopus 로고
    • S. Researcher, and I. B. M. X-force, Agenda
    • J. Larimer, S. Researcher, and I. B. M. X-force, "An inside look at Stuxnet," Agenda, 2009.
    • (2009) An Inside Look at Stuxnet
    • Larimer, J.1
  • 21
    • 84866766228 scopus 로고    scopus 로고
    • Oreans Technologies, "Themida," http://www.oreans.com/.
    • Themida
  • 22
    • 84947615443 scopus 로고    scopus 로고
    • ASPack
    • ASPack Software, "ASPack," http://www.aspack.com/.
    • ASPack Software
  • 25
    • 34047180006 scopus 로고    scopus 로고
    • Code Normalization for Self-Mutating Malware
    • D. Bruschi, L. Martignoni, and M. Monga, "Code Normalization for Self-Mutating Malware," Ieee Security And Privacy, vol. 5, no. 2, pp. 46-54, 2007.
    • (2007) Ieee Security and Privacy , vol.5 , Issue.2 , pp. 46-54
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 26
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • [Online]. Available
    • Fred and Cohen, "Computer viruses: Theory and experiments," Computers and Security, vol. 6, no. 1, pp. 22-35, 1987. [Online]. Available: http://www.sciencedirect.com/science/article/pii/0167404887901222
    • (1987) Computers and Security , vol.6 , Issue.1 , pp. 22-35
    • Fred1    Cohen2
  • 27
  • 28
    • 80053166833 scopus 로고    scopus 로고
    • Amazon, "Amazon EC2 FAQs," 2011, http://aws.amazon.com/ec2/ faqs/.
    • (2011) Amazon EC2 FAQs
  • 31
    • 84866765981 scopus 로고    scopus 로고
    • The definitive guide to the xen hypervisor
    • D. Chisnall, "The definitive guide to the xen hypervisor," Journal of the Electrochemical Society, vol. 129, p. 2865, 2007.
    • (2007) Journal of the Electrochemical Society , vol.129 , pp. 2865
    • Chisnall, D.1
  • 37
    • 84866753850 scopus 로고    scopus 로고
    • J. Rutkowska, "Redpill," 2004, http://www.invisiblethings.org/ papers/redpill.html.
    • (2004) Redpill
    • Rutkowska, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.