-
1
-
-
33646767376
-
Control flow integrity principles, implementations, and applications
-
Alexandria, Virginia, Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control flow integrity principles, implementations, and applications. In ACM CCS, Alexandria, Virginia, Nov. 2005.
-
(2005)
ACM CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
60649106745
-
Automatic inference and enforcement of kernel data structures invariants
-
Anaheim, CA, Dec
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structures invariants. In ACSAC, Anaheim, CA, Dec. 2008.
-
(2008)
ACSAC
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
4
-
-
4444265683
-
Xen and the art of virtualization
-
Bolton Landing, NY, Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
-
(2003)
ACM SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
84872120029
-
Fast byte-granularity software fault isolation
-
Big Sky, Montana, Oct
-
M. Castro, M. Costa, J. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black. Fast byte-granularity software fault isolation. In ACM SOSP, Big Sky, Montana, Oct. 2009.
-
(2009)
ACM SOSP
-
-
Castro, M.1
Costa, M.2
Martin, J.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
8
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Baltimore, MD, Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In USENIX Security, Baltimore, MD, Aug. 2005.
-
(2005)
USENIX Security
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
9
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Seattle, WA, Mar
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ASPLOS, Seattle, WA, Mar. 2008.
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E. C.3
Subrahmanyam, P.4
Waldspurger, C. A.5
Boneh, D.6
Dwoskin, J.7
Ports, D. R.8
-
10
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
Mesa, AZ, Apr
-
T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDSC, Mesa, AZ, Apr. 2001.
-
(2001)
ICDSC
-
-
Chiueh, T.1
Hsu, F.2
-
11
-
-
84912138370
-
Memory safety for low-level software/hardware interactions
-
Montreal, Canada, Aug
-
J. Criswell, N. Geoffray, and V. Adve. Memory safety for low-level software/hardware interactions. In Usenix Security, Montreal, Canada, Aug 2009.
-
(2009)
Usenix Security
-
-
Criswell, J.1
Geoffray, N.2
Adve, V.3
-
12
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Boston, MA, Dec
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, Boston, MA, Dec. 2002.
-
(2002)
OSDI
-
-
Dunlap, G. W.1
King, S. T.2
Cinar, S.3
Basrai, M. A.4
Chen, P. M.5
-
13
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Seattle, WA, Nov
-
Ú. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, Seattle, WA, Nov. 2006.
-
(2006)
OSDI
-
-
Erlingsson, Ú.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G. C.5
-
14
-
-
84858758065
-
Vx32: Lightweight user-level sand-boxing on the x86
-
Boston, MA, June
-
B. Ford and R. Cox. Vx32: Lightweight user-level sand-boxing on the x86. In USENIX ATC, Boston, MA, June 2008.
-
(2008)
USENIX ATC
-
-
Ford, B.1
Cox, R.2
-
15
-
-
85084163372
-
StackGhost: Hardware facilitated stack protection
-
Washington, D.C., Aug
-
M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In USENIX Security, Washington, D.C., Aug. 2001.
-
(2001)
USENIX Security
-
-
Frantzen, M.1
Shuey, M.2
-
16
-
-
84858777014
-
The design and implementation of microdrivers
-
Seattle, WA, Mar
-
V. Ganapathy, M. J. Renzelmann, A. Balakrishnan, M. M. Swift, and S. Jha. The design and implementation of microdrivers. In ASPLOS, Seattle, WA, Mar. 2008.
-
(2008)
ASPLOS
-
-
Ganapathy, V.1
Renzelmann, M. J.2
Balakrishnan, A.3
Swift, M. M.4
Jha, S.5
-
17
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
San Diego, CA, Feb
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, San Diego, CA, Feb. 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
18
-
-
85029681162
-
Return-oriented rootkis: Bypassing kernel code integrity protection mechanisms
-
Montreal, Canada, Aug
-
R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkis: Bypassing kernel code integrity protection mechanisms. In Usenix Security, Montreal, Canada, Aug 2009.
-
(2009)
Usenix Security
-
-
Hund, R.1
Holz, T.2
Freiling, F. C.3
-
20
-
-
84894039099
-
Antfarm: Tracking processes in a virtual machine environment
-
Boston, MA, June
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Antfarm: Tracking processes in a virtual machine environment. In USENIX ATC, Boston, MA, June 2006.
-
(2006)
USENIX ATC
-
-
Jones, S. T.1
Arpaci-Dusseau, A. C.2
Arpaci-Dusseau, R. H.3
-
21
-
-
78249244635
-
-
Last accessed Aug. 05
-
K. Kasslin. Evolution of kernel-mode malware. http://igloo.engineeringforfun.com/malwares/Kimmo_Kasslin_Evolution_of_ kernel_mode_malware_v2.pdf. Last accessed Aug. 05, 2010.
-
(2010)
Evolution of kernel-mode malware
-
-
Kasslin, K.1
-
22
-
-
84978897353
-
Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps
-
Ottawa, Canada, June
-
J. Keniston, A. Mavinakayanahalli, P. Panchamukhi, and V. Prasad. Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps. In Linux Symposium, Ottawa, Canada, June 2007.
-
(2007)
Linux Symposium
-
-
Keniston, J.1
Mavinakayanahalli, A.2
Panchamukhi, P.3
Prasad, V.4
-
24
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
Oakland, CA, May
-
S. T. King, P. M. Chen, Y. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
King, S. T.1
Chen, P. M.2
Wang, Y.3
Verbowski, C.4
Wang, H. J.5
Lorch, J. R.6
-
25
-
-
85084162336
-
Secure execution via program shepherding
-
San Francisco, CA, Aug
-
V. Kiriansky, D. Bruening, and S. P. Amarasinghe. Secure execution via program shepherding. In USENIX Security, San Francisco, CA, Aug 2002.
-
(2002)
USENIX Security
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S. P.3
-
26
-
-
85180631321
-
-
Last accessed Aug. 05
-
Larry McVoy and Carl Staelin. lmbench. http://www.bitmover.com/lmbench/. Last accessed Aug. 05, 2010.
-
(2010)
lmbench
-
-
McVoy, Larry1
Staelin, Carl2
-
27
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
San Jose, CA, Aug
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In USENIX Security, San Jose, CA, Aug. 2008.
-
(2008)
USENIX Security
-
-
Litty, L.1
Lagar-Cavilla, H. A.2
Lie, D.3
-
28
-
-
38149080457
-
Probing the guts of kprobes
-
Ottawa, Canada, July
-
A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, and M. Hiramatsu. Probing the guts of kprobes. In Linux Symposium, Ottawa, Canada, July 2006.
-
(2006)
Linux Symposium
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
29
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA, May
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Payne, B. D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
30
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, BC, Canada, Aug
-
N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security, Vancouver, BC, Canada, Aug. 2006.
-
(2006)
USENIX Security
-
-
Petroni, N. L.1
Fraser, T.2
Walters, A.3
Arbaugh, W. A.4
-
31
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
Alexandria, VA, Nov
-
N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In ACM CCS, Alexandria, VA, Nov. 2007.
-
(2007)
ACM CCS
-
-
Petroni, N. L.1
Hicks, M.2
-
33
-
-
77949482509
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Boston, MA, Sept
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, Boston, MA, Sept. 2008.
-
(2008)
RAID
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
34
-
-
55549097262
-
Subverting Vista kernel for fun and profit
-
J. Rutkowska. Subverting Vista kernel for fun and profit. In Black Hat USA, 2006.
-
(2006)
Black Hat USA
-
-
Rutkowska, J.1
-
35
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
Seattle, WA, Oct
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, Seattle, WA, Oct 1996.
-
(1996)
OSDI
-
-
Seltzer, M. I.1
Endo, Y.2
Small, C.3
Smith, K. A.4
-
36
-
-
77955224892
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson, WA, Oct
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP, Stevenson, WA, Oct. 2007.
-
(2007)
ACM SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
37
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
Chicago, IL, Nov
-
M. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-vm monitoring using hardware virtualization. In ACM CCS, Chicago, IL, Nov. 2009.
-
(2009)
ACM CCS
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
38
-
-
84877782857
-
BitVisor: A thin hypervisor for enforcing I/O device security
-
Washington, DC, Mar
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. BitVisor: A thin hypervisor for enforcing I/O device security. In ACM VEE, Washington, DC, Mar. 2009.
-
(2009)
ACM VEE
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
39
-
-
85180624446
-
-
Sourceforge. Last accessed Aug. 05
-
Sourceforge. Iperf. http://sourceforge.net/projects/iperf/. Last accessed Aug. 05, 2010.
-
(2010)
Iperf
-
-
-
40
-
-
78249241662
-
Kernel data integrity protection via memory access control
-
Georgia Institute of Technology, Atlanta, GA
-
A. Srivastava, I. Erete, and J. Giffin. Kernel data integrity protection via memory access control. In Technical Report GT-CS-09-05, Georgia Institute of Technology, Atlanta, GA, 2009.
-
(2009)
Technical Report GT-CS-09-05
-
-
Srivastava, A.1
Erete, I.2
Giffin, J.3
-
41
-
-
80052013311
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Boston, MA, Sept
-
A. Srivastava and J. Giffin. Tamper-resistant, application-aware blocking of malicious network connections. In RAID, Boston, MA, Sept. 2008.
-
(2008)
RAID
-
-
Srivastava, A.1
Giffin, J.2
-
42
-
-
84872104166
-
Automatic discovery of parasitic malware
-
Ottawa, Canada, Sept
-
A. Srivastava and J. Giffin. Automatic discovery of parasitic malware. In RAID, Ottawa, Canada, Sept. 2010.
-
(2010)
RAID
-
-
Srivastava, A.1
Giffin, J.2
-
43
-
-
85180637536
-
-
Last accessed Aug. 05
-
Sun Microsystem. Dtrace. http://wikis.sun.com/display/DTrace/DTrace. Last accessed Aug. 05, 2010.
-
(2010)
Dtrace
-
-
Microsystem, Sun1
-
44
-
-
33646691869
-
Improving the reliability of commodity operating systems
-
Bolton Landing, NY, Oct
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
-
(2003)
ACM SOSP
-
-
Swift, M. M.1
Bershad, B. N.2
Levy, H. M.3
-
46
-
-
85180632408
-
-
Last accessed Aug. 05
-
Tim Bray. Bonnie. http://www.garloff.de/kurt/linux/bonnie. Last accessed Aug. 05, 2010.
-
(2010)
Bonnie
-
-
Bray, Tim1
-
47
-
-
85180627058
-
-
Last accessed Aug. 05
-
Uwe F. Mayer. BYTEmark. http://www.tux.org/mayer/linux/bmark.html. Last accessed Aug. 05, 2010.
-
(2010)
BYTEmark
-
-
Mayer, Uwe F.1
-
48
-
-
0001225966
-
Efficient software-based fault isolation
-
Asheville, NC, Dec
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In ACM SOSP, Asheville, NC, Dec. 1994.
-
(1994)
ACM SOSP
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
49
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Chicago, IL, Nov
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In ACM CCS, Chicago, IL, Nov. 2009.
-
(2009)
ACM CCS
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
50
-
-
79953097106
-
Device driver safety through a reference validation mechanism
-
San Diego, CA, Dec
-
D. Williams, P. Reynolds, K. Walsh, E. G. Sirer, and F. B. Schneider. Device driver safety through a reference validation mechanism. In OSDI, San Diego, CA, Dec. 2008.
-
(2008)
OSDI
-
-
Williams, D.1
Reynolds, P.2
Walsh, K.3
Sirer, E. G.4
Schneider, F. B.5
-
51
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
Oakland, CA, May
-
B. Yee, D. Sehr, G. Dardyk, B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2009.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|