메뉴 건너뛰기




Volumn , Issue , 2012, Pages 429-438

Efficient protection of kernel data structures via object partitioning

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; COMMODITY OPERATING SYSTEMS; EFFICIENT PROTECTIONS; KERNEL COMPONENTS; KERNEL MEMORY; MALICIOUS SOFTWARE; MALWARES; MEMORY ADDRESS SPACE; MEMORY PAGES; POLICY ENFORCEMENT; RUNTIMES; STRUCTURE ELEMENTS; VIRTUAL MEMORY MANAGEMENT;

EID: 84872102802     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2420950.2421012     Document Type: Conference Paper
Times cited : (30)

References (43)
  • 1
    • 84872103958 scopus 로고    scopus 로고
    • Last Accessed Sep. 15, 2012
    • Branch Tracing with Intel MSR Registers. http://www.openrce.org/blog/ view/535/Branch-Tracing-with-Intel-MSR-Registers. Last Accessed Sep. 15, 2012.
    • Branch Tracing with Intel MSR Registers
  • 2
    • 84872108924 scopus 로고    scopus 로고
    • Last Accessed Sep. 15, 2012
    • New for Kernel-Mode Driver Architecture. http://msdn.microsoft.com/en-us/ library/windows/hardware/hh439748%28v=vs.85%29.aspx. Last Accessed Sep. 15, 2012.
    • New for Kernel-Mode Driver Architecture
  • 3
    • 84872099305 scopus 로고    scopus 로고
    • Last Accessed Sep. 15, 2012
    • Windows 8 Security: What's New. http://www.pcworld.com/article/255776/ windows-8-security-whats-new.html. Last Accessed Sep. 15, 2012.
    • Windows 8 Security: What's New
  • 4
    • 84872101284 scopus 로고    scopus 로고
    • Last Accessed Sep. 15, 2012
    • Windows ISV Software Security Defenses. http://msdn.microsoft.com/en-us/ library/bb430720. Last Accessed Sep. 15, 2012.
    • Windows ISV Software Security Defenses
  • 5
    • 34547461216 scopus 로고    scopus 로고
    • A comparison of software and hardware techniques for x86 virtualization
    • San Jose, CA, Oct.
    • K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS, San Jose, CA, Oct. 2006.
    • (2006) ASPLOS
    • Adams, K.1    Agesen, O.2
  • 6
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structures invariants
    • Anaheim, CA, Dec.
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structures invariants. In ACSAC, Anaheim, CA, Dec. 2008.
    • (2008) ACSAC
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 9
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Apr.
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre, Apr. 1977.
    • (1977) Technical Report MTR-3153 Mitre
    • Biba, K.J.1
  • 10
    • 85084162449 scopus 로고
    • The slab allocator: An object-caching kernel memory allocator
    • Boston, MA, June
    • J. Bonwick. The slab allocator: An object-caching kernel memory allocator. In USENIX, Boston, MA, June 1994.
    • (1994) USENIX
    • Bonwick, J.1
  • 13
    • 85060818077 scopus 로고
    • Introduction and overview of the Multics system
    • Las Vegas, NV, Nov.
    • F. Corbato and V. Vyssotsky. Introduction and overview of the Multics system. In Fall Joint Computer Conference, Las Vegas, NV, Nov. 1965.
    • (1965) Fall Joint Computer Conference
    • Corbato, F.1    Vyssotsky, V.2
  • 14
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • Alexandria, VA, Oct.
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: Malware analysis via hardware virtualization extensions. In ACM CCS, Alexandria, VA, Oct. 2008.
    • (2008) ACM CCS
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 15
    • 78651539599 scopus 로고    scopus 로고
    • XFI: Software guards for system address spaces
    • Seattle, WA, Nov.
    • U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, Seattle, WA, Nov. 2006.
    • (2006) OSDI
    • Erlingsson, U.1    Abadi, M.2    Vrable, M.3    Budiu, M.4    Necula, G.C.5
  • 16
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • Bolton Landing, NY, Oct.
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
    • (2003) ACM SOSP
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 17
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • San Diego, CA, Feb.
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, San Diego, CA, Feb. 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 18
    • 27544459540 scopus 로고    scopus 로고
    • Intel, Intel 64 and IA-32 Architectures Software Developer's Manual
    • Intel. System Programming Guide: Part 2. Intel 64 and IA-32 Architectures Software Developer's Manual, 2004.
    • (2004) System Programming Guide: Part 2
  • 19
    • 84872111868 scopus 로고    scopus 로고
    • Stealthy malware detection through VMM-based 'out-of-the-box' semantic view
    • Alexandria, VA, Nov.
    • X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through VMM-based 'out-of-the-box' semantic view. In ACM CCS, Alexandria, VA, Nov. 2007.
    • (2007) ACM CCS
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 20
    • 84872113652 scopus 로고    scopus 로고
    • VMM-based hidden process detection and identification using Lycosid
    • Seattle, WA, Mar.
    • S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. VMM-based hidden process detection and identification using Lycosid. In ACM VEE, Seattle, WA, Mar. 2008.
    • (2008) ACM VEE
    • Jones, S.T.1    Arpaci-Dusseau, A.C.2    Arpaci-Dusseau, R.H.3
  • 22
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • San Jose, CA, Aug.
    • L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In USENIX Security Symposium, San Jose, CA, Aug. 2008.
    • (2008) USENIX Security Symposium
    • Litty, L.1    Lagar-Cavilla, H.A.2    Lie, D.3
  • 23
    • 84872105546 scopus 로고    scopus 로고
    • Last accessed Sep. 15, 2012
    • Microsoft. PatchGuard. http://blogs.msdn.com/windowsvistasecurity/ archive/2006/08/11/695993.aspx. Last accessed Sep. 15, 2012.
    • Microsoft. PatchGuard
  • 24
    • 1542355459 scopus 로고    scopus 로고
    • CIL: Intermediate language and tools for analysis and transformation of C programs
    • Grenoble, France, Apr.
    • G. C. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Conference on Compiler Construction (CC), Grenoble, France, Apr. 2002.
    • (2002) Conference on Compiler Construction (CC)
    • Necula, G.C.1    McPeak, S.2    Rahul, S.3    Weimer, W.4
  • 25
    • 84872119713 scopus 로고    scopus 로고
    • Last accessed Sep. 15, 2012
    • Packet Storm. All-root. http://packetstormsecurity.org/UNIX/penetration/ rootkits/all-root.c. Last accessed Sep. 15, 2012.
    • All-root
  • 26
    • 48649085344 scopus 로고    scopus 로고
    • Secure and flexible monitoring of virtual machines
    • Miami, FL, Dec.
    • B. D. Payne, M. Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In ACSAC, Miami, FL, Dec. 2007.
    • (2007) ACSAC
    • Payne, B.D.1    Carbone, M.2    Lee, W.3
  • 28
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Vancouver, BC, Canada, Aug.
    • N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, Vancouver, BC, Canada, Aug. 2006.
    • (2006) USENIX Security Symposium
    • Petroni Jr., N.L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.A.4
  • 29
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • Alexandria, VA, Nov.
    • N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In ACM CCS, Alexandria, VA, Nov. 2007.
    • (2007) ACM CCS
    • Petroni Jr., N.L.1    Hicks, M.2
  • 30
    • 77949482509 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Boston, MA, Sept.
    • R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, Boston, MA, Sept. 2008.
    • (2008) RAID
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 33
    • 77955224892 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Stevenson, WA, Oct.
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP, Stevenson, WA, Oct. 2007.
    • (2007) ACM SOSP
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 34
    • 79959884555 scopus 로고    scopus 로고
    • Exploiting hardware advances for software testing and debugging
    • Honolulu, HI, May
    • M. L. Soffa, K. R. Walcott, and J. Mars. Exploiting hardware advances for software testing and debugging. In ICSE, Honolulu, HI, May 2011.
    • (2011) ICSE
    • Soffa, M.L.1    Walcott, K.R.2    Mars, J.3
  • 35
    • 80052013311 scopus 로고    scopus 로고
    • Tamper-resistant, application-aware blocking of malicious network connections
    • Boston, MA, Sept.
    • A. Srivastava and J. Giffin. Tamper-resistant, application-aware blocking of malicious network connections. In RAID, Boston, MA, Sept. 2008.
    • (2008) RAID
    • Srivastava, A.1    Giffin, J.2
  • 36
    • 84872104166 scopus 로고    scopus 로고
    • Automatic discovery of parasitic malware
    • Ottawa, Canada, Sept.
    • A. Srivastava and J. Giffin. Automatic discovery of parasitic malware. In RAID, Ottawa, Canada, Sept. 2010.
    • (2010) RAID
    • Srivastava, A.1    Giffin, J.2
  • 37
    • 84867864575 scopus 로고    scopus 로고
    • Efficient monitoring of untrusted kernel-mode execution
    • San Diego, California, Feb.
    • A. Srivastava and J. Giffin. Efficient monitoring of untrusted kernel-mode execution. In NDSS, San Diego, California, Feb. 2011.
    • (2011) NDSS
    • Srivastava, A.1    Giffin, J.2
  • 38
    • 84898956771 scopus 로고    scopus 로고
    • Operating system interface obfuscation and the revealing of hidden operations
    • Netherlands, July
    • A. Srivastava, A. Lanzi, J. Giffin, and D. Balzarotti. Operating system interface obfuscation and the revealing of hidden operations. In DIMVA, Netherlands, July 2011.
    • (2011) DIMVA
    • Srivastava, A.1    Lanzi, A.2    Giffin, J.3    Balzarotti, D.4
  • 39
    • 84872112887 scopus 로고    scopus 로고
    • Last accessed Sep. 15, 2012
    • Symantec. Windows rootkit overview. http://www.symantec.com/avcenter/ reference/windows.rootkit.overview.pdf. Last accessed Sep. 15, 2012.
    • Windows Rootkit Overview
  • 40
    • 84872121334 scopus 로고    scopus 로고
    • UBRA. Process hiding and the Linux scheduler
    • Jan.
    • ubra. Process hiding and the Linux scheduler. Phrack, 11(63), Jan. 2005.
    • (2005) Phrack , vol.11 , Issue.63
  • 41
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Chicago, IL, Nov.
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In ACM CCS, Chicago, IL, Nov. 2009.
    • (2009) ACM CCS
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 42
    • 0036957412 scopus 로고    scopus 로고
    • Mondrian memory protection
    • San Jose, CA, Oct.
    • E. Witchel, J. Cates, and K. Asanovic. Mondrian memory protection. In ASPLOS, San Jose, CA, Oct. 2002.
    • (2002) ASPLOS
    • Witchel, E.1    Cates, J.2    Asanovic, K.3
  • 43
    • 85093189156 scopus 로고    scopus 로고
    • Practical protection of kernel integrity for commodity OS from untrusted extensions
    • San Diego, California, Feb.
    • X. Xiong, D. Tian, and P. Liu. Practical protection of kernel integrity for commodity os from untrusted extensions. In NDSS, San Diego, California, Feb. 2011.
    • (2011) NDSS
    • Xiong, X.1    Tian, D.2    Liu, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.