-
8
-
-
21644433634
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
10
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In Proceedings of the 22nd Symposium on Operating Systems Principles, October 2009.
-
Proceedings of the 22nd Symposium on Operating Systems Principles, October 2009
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
12
-
-
33751032041
-
SubVirt: Implementing Malware with Virtual Machines
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J.Wang, and J. R. Lorch. SubVirt: Implementing Malware with Virtual Machines. In Proceedings of the 27th IEEE Symposium on Security and Privacy, 2006.
-
Proceedings of the 27th IEEE Symposium on Security and Privacy, 2006
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
13
-
-
67249098186
-
Subverting the Xen Hypervisor
-
R. Wojtczuk. Subverting the Xen Hypervisor. In Black Hat USA, 2008.
-
(2008)
Black Hat USA
-
-
Wojtczuk, R.1
-
14
-
-
84870648305
-
-
The Blue Pill Project. http://bluepillproject.org/.
-
-
-
-
16
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
21
-
-
84861443711
-
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage. In Proceedings of EVT/WOTE 2009, 2009.
-
(2009)
Proceedings of EVT/WOTE 2009
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
22
-
-
79956057382
-
Developments in Cisco IOS forensics
-
Nov.
-
F. Lindner. Developments in Cisco IOS forensics. CONFidence 2.0. http://www.recurity-labs.com/content/pub/FX-Router-Exploitation.pdf, Nov.2009.
-
(2009)
CONFidence 2.0
-
-
Lindner, F.1
-
24
-
-
84870649807
-
-
S. Ragan. http://www.thetechherald.com/articles/Adobe-confirms-Zero-Day- ROP-used-to-bypass-Windows-defenses/11273/
-
-
-
Ragan, S.1
-
30
-
-
41149103393
-
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
-
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of 21st ACM Symposium on Operating Systems Principles, October, 2007.
-
Proceedings of 21st ACM Symposium on Operating Systems Principles, October, 2007
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
31
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A. Trustvisor: Efficient tcb reduction and attestation. In Proceedings of the 31st IEEE Symposiumon Security and Privacy, 2010.
-
Proceedings of the 31st IEEE Symposiumon Security and Privacy, 2010
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
32
-
-
67650079952
-
Bit-Visor: A Thin Hypervisor for Enforcing I/O Device Security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Ohyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. Bit-Visor: A Thin Hypervisor for Enforcing I/O Device Security. In Proceedings of the 5th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2009.
-
Proceedings of the 5th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2009
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Ohyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
36
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005.
-
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
37
-
-
84870628186
-
-
ROPEME tool. http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made- easy/
-
ROPEME Tool
-
-
-
38
-
-
84870628949
-
-
Multiple integer overflows. http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2011-1583.
-
Multiple Integer Overflows
-
-
-
39
-
-
77950832584
-
-
Solar Designer. Bugtraq
-
Solar Designer. "return-to-libc" attack, Bugtraq, 1997.
-
(1997)
"Return-to-libc" Attack
-
-
-
40
-
-
84863268963
-
Preventing and detecting Xen hypervisor subversions
-
J. Rutkowska and R. Wojtczuk. Preventing and detecting Xen hypervisor subversions. In Black Hat USA, 2008.
-
(2008)
Black Hat USA
-
-
Rutkowska, J.1
Wojtczuk, R.2
|