메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Efficient Monitoring of Untrusted Kernel-Mode Execution

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); GATEWAYS (COMPUTER NETWORKS); NETWORK SECURITY;

EID: 84867864575     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (51)
  • 1
    • 33646767376 scopus 로고    scopus 로고
    • Control flow integrity principles, implementations, and applications
    • Alexandria, Virginia, Nov
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control flow integrity principles, implementations, and applications. In ACM CCS, Alexandria, Virginia, Nov. 2005.
    • (2005) ACM CCS
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 3
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structures invariants
    • Anaheim, CA, Dec
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structures invariants. In ACSAC, Anaheim, CA, Dec. 2008.
    • (2008) ACSAC
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 5
  • 10
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • Mesa, AZ, Apr
    • T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDSC, Mesa, AZ, Apr. 2001.
    • (2001) ICDSC
    • Chiueh, T.1    Hsu, F.2
  • 11
    • 84912138370 scopus 로고    scopus 로고
    • Memory safety for low-level software/hardware interactions
    • Montreal, Canada, Aug
    • J. Criswell, N. Geoffray, and V. Adve. Memory safety for low-level software/hardware interactions. In Usenix Security, Montreal, Canada, Aug 2009.
    • (2009) Usenix Security
    • Criswell, J.1    Geoffray, N.2    Adve, V.3
  • 12
    • 11844249640 scopus 로고    scopus 로고
    • ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Boston, MA, Dec
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, Boston, MA, Dec. 2002.
    • (2002) OSDI
    • Dunlap, G. W.1    King, S. T.2    Cinar, S.3    Basrai, M. A.4    Chen, P. M.5
  • 14
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: Lightweight user-level sand-boxing on the x86
    • Boston, MA, June
    • B. Ford and R. Cox. Vx32: Lightweight user-level sand-boxing on the x86. In USENIX ATC, Boston, MA, June 2008.
    • (2008) USENIX ATC
    • Ford, B.1    Cox, R.2
  • 15
    • 85084163372 scopus 로고    scopus 로고
    • StackGhost: Hardware facilitated stack protection
    • Washington, D.C., Aug
    • M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In USENIX Security, Washington, D.C., Aug. 2001.
    • (2001) USENIX Security
    • Frantzen, M.1    Shuey, M.2
  • 17
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • San Diego, CA, Feb
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, San Diego, CA, Feb. 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 18
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkis: Bypassing kernel code integrity protection mechanisms
    • Montreal, Canada, Aug
    • R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkis: Bypassing kernel code integrity protection mechanisms. In Usenix Security, Montreal, Canada, Aug 2009.
    • (2009) Usenix Security
    • Hund, R.1    Holz, T.2    Freiling, F. C.3
  • 20
    • 84894039099 scopus 로고    scopus 로고
    • Antfarm: Tracking processes in a virtual machine environment
    • Boston, MA, June
    • S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Antfarm: Tracking processes in a virtual machine environment. In USENIX ATC, Boston, MA, June 2006.
    • (2006) USENIX ATC
    • Jones, S. T.1    Arpaci-Dusseau, A. C.2    Arpaci-Dusseau, R. H.3
  • 21
    • 78249244635 scopus 로고    scopus 로고
    • Last accessed Aug. 05
    • K. Kasslin. Evolution of kernel-mode malware. http://igloo.engineeringforfun.com/malwares/Kimmo_Kasslin_Evolution_of_ kernel_mode_malware_v2.pdf. Last accessed Aug. 05, 2010.
    • (2010) Evolution of kernel-mode malware
    • Kasslin, K.1
  • 22
  • 26
    • 85180631321 scopus 로고    scopus 로고
    • Last accessed Aug. 05
    • Larry McVoy and Carl Staelin. lmbench. http://www.bitmover.com/lmbench/. Last accessed Aug. 05, 2010.
    • (2010) lmbench
    • McVoy, Larry1    Staelin, Carl2
  • 27
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • San Jose, CA, Aug
    • L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In USENIX Security, San Jose, CA, Aug. 2008.
    • (2008) USENIX Security
    • Litty, L.1    Lagar-Cavilla, H. A.2    Lie, D.3
  • 30
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Vancouver, BC, Canada, Aug
    • N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security, Vancouver, BC, Canada, Aug. 2006.
    • (2006) USENIX Security
    • Petroni, N. L.1    Fraser, T.2    Walters, A.3    Arbaugh, W. A.4
  • 31
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • Alexandria, VA, Nov
    • N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In ACM CCS, Alexandria, VA, Nov. 2007.
    • (2007) ACM CCS
    • Petroni, N. L.1    Hicks, M.2
  • 33
    • 77949482509 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Boston, MA, Sept
    • R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, Boston, MA, Sept. 2008.
    • (2008) RAID
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 34
    • 55549097262 scopus 로고    scopus 로고
    • Subverting Vista kernel for fun and profit
    • J. Rutkowska. Subverting Vista kernel for fun and profit. In Black Hat USA, 2006.
    • (2006) Black Hat USA
    • Rutkowska, J.1
  • 35
    • 85084100576 scopus 로고    scopus 로고
    • Dealing with disaster: Surviving misbehaved kernel extensions
    • Seattle, WA, Oct
    • M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, Seattle, WA, Oct 1996.
    • (1996) OSDI
    • Seltzer, M. I.1    Endo, Y.2    Small, C.3    Smith, K. A.4
  • 36
    • 77955224892 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Stevenson, WA, Oct
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP, Stevenson, WA, Oct. 2007.
    • (2007) ACM SOSP
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 37
    • 74049145643 scopus 로고    scopus 로고
    • Secure in-vm monitoring using hardware virtualization
    • Chicago, IL, Nov
    • M. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-vm monitoring using hardware virtualization. In ACM CCS, Chicago, IL, Nov. 2009.
    • (2009) ACM CCS
    • Sharif, M.1    Lee, W.2    Cui, W.3    Lanzi, A.4
  • 39
    • 85180624446 scopus 로고    scopus 로고
    • Sourceforge. Last accessed Aug. 05
    • Sourceforge. Iperf. http://sourceforge.net/projects/iperf/. Last accessed Aug. 05, 2010.
    • (2010) Iperf
  • 40
    • 78249241662 scopus 로고    scopus 로고
    • Kernel data integrity protection via memory access control
    • Georgia Institute of Technology, Atlanta, GA
    • A. Srivastava, I. Erete, and J. Giffin. Kernel data integrity protection via memory access control. In Technical Report GT-CS-09-05, Georgia Institute of Technology, Atlanta, GA, 2009.
    • (2009) Technical Report GT-CS-09-05
    • Srivastava, A.1    Erete, I.2    Giffin, J.3
  • 41
    • 80052013311 scopus 로고    scopus 로고
    • Tamper-resistant, application-aware blocking of malicious network connections
    • Boston, MA, Sept
    • A. Srivastava and J. Giffin. Tamper-resistant, application-aware blocking of malicious network connections. In RAID, Boston, MA, Sept. 2008.
    • (2008) RAID
    • Srivastava, A.1    Giffin, J.2
  • 42
    • 84872104166 scopus 로고    scopus 로고
    • Automatic discovery of parasitic malware
    • Ottawa, Canada, Sept
    • A. Srivastava and J. Giffin. Automatic discovery of parasitic malware. In RAID, Ottawa, Canada, Sept. 2010.
    • (2010) RAID
    • Srivastava, A.1    Giffin, J.2
  • 43
    • 85180637536 scopus 로고    scopus 로고
    • Last accessed Aug. 05
    • Sun Microsystem. Dtrace. http://wikis.sun.com/display/DTrace/DTrace. Last accessed Aug. 05, 2010.
    • (2010) Dtrace
    • Microsystem, Sun1
  • 44
    • 33646691869 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • Bolton Landing, NY, Oct
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
    • (2003) ACM SOSP
    • Swift, M. M.1    Bershad, B. N.2    Levy, H. M.3
  • 46
    • 85180632408 scopus 로고    scopus 로고
    • Last accessed Aug. 05
    • Tim Bray. Bonnie. http://www.garloff.de/kurt/linux/bonnie. Last accessed Aug. 05, 2010.
    • (2010) Bonnie
    • Bray, Tim1
  • 47
    • 85180627058 scopus 로고    scopus 로고
    • Last accessed Aug. 05
    • Uwe F. Mayer. BYTEmark. http://www.tux.org/mayer/linux/bmark.html. Last accessed Aug. 05, 2010.
    • (2010) BYTEmark
    • Mayer, Uwe F.1
  • 48
  • 49
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Chicago, IL, Nov
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In ACM CCS, Chicago, IL, Nov. 2009.
    • (2009) ACM CCS
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 50
    • 79953097106 scopus 로고    scopus 로고
    • Device driver safety through a reference validation mechanism
    • San Diego, CA, Dec
    • D. Williams, P. Reynolds, K. Walsh, E. G. Sirer, and F. B. Schneider. Device driver safety through a reference validation mechanism. In OSDI, San Diego, CA, Dec. 2008.
    • (2008) OSDI
    • Williams, D.1    Reynolds, P.2    Walsh, K.3    Sirer, E. G.4    Schneider, F. B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.