메뉴 건너뛰기




Volumn , Issue , 2012, Pages 479-484

Return-oriented programming attack on the Xen hypervisor

Author keywords

hypervisor; privilege escalation; Return oriented programming; security

Indexed keywords

HYPERVISOR; INTEGRITY PROTECTION; PRIVILEGE ESCALATION; RUNTIMES; SECURITY;

EID: 84869391331     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2012.16     Document Type: Conference Paper
Times cited : (19)

References (41)
  • 13
    • 67249098186 scopus 로고    scopus 로고
    • Subverting the Xen Hypervisor
    • R. Wojtczuk. Subverting the Xen Hypervisor. In Black Hat USA, 2008.
    • (2008) Black Hat USA
    • Wojtczuk, R.1
  • 14
    • 84870648305 scopus 로고    scopus 로고
    • The Blue Pill Project. http://bluepillproject.org/.
  • 22
    • 79956057382 scopus 로고    scopus 로고
    • Developments in Cisco IOS forensics
    • Nov.
    • F. Lindner. Developments in Cisco IOS forensics. CONFidence 2.0. http://www.recurity-labs.com/content/pub/FX-Router-Exploitation.pdf, Nov.2009.
    • (2009) CONFidence 2.0
    • Lindner, F.1
  • 24
    • 84870649807 scopus 로고    scopus 로고
    • S. Ragan. http://www.thetechherald.com/articles/Adobe-confirms-Zero-Day- ROP-used-to-bypass-Windows-defenses/11273/
    • Ragan, S.1
  • 37
    • 84870628186 scopus 로고    scopus 로고
    • ROPEME tool. http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made- easy/
    • ROPEME Tool
  • 38
  • 39
    • 77950832584 scopus 로고    scopus 로고
    • Solar Designer. Bugtraq
    • Solar Designer. "return-to-libc" attack, Bugtraq, 1997.
    • (1997) "Return-to-libc" Attack
  • 40
    • 84863268963 scopus 로고    scopus 로고
    • Preventing and detecting Xen hypervisor subversions
    • J. Rutkowska and R. Wojtczuk. Preventing and detecting Xen hypervisor subversions. In Black Hat USA, 2008.
    • (2008) Black Hat USA
    • Rutkowska, J.1    Wojtczuk, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.