-
1
-
-
84872103958
-
-
Last Accessed Sep. 15, 2012
-
Branch Tracing with Intel MSR Registers. http://www.openrce.org/blog/ view/535/Branch-Tracing-with-Intel-MSR-Registers. Last Accessed Sep. 15, 2012.
-
Branch Tracing with Intel MSR Registers
-
-
-
2
-
-
84872108924
-
-
Last Accessed Sep. 15, 2012
-
New for Kernel-Mode Driver Architecture. http://msdn.microsoft.com/en-us/ library/windows/hardware/hh439748%28v=vs.85%29.aspx. Last Accessed Sep. 15, 2012.
-
New for Kernel-Mode Driver Architecture
-
-
-
3
-
-
84872099305
-
-
Last Accessed Sep. 15, 2012
-
Windows 8 Security: What's New. http://www.pcworld.com/article/255776/ windows-8-security-whats-new.html. Last Accessed Sep. 15, 2012.
-
Windows 8 Security: What's New
-
-
-
4
-
-
84872101284
-
-
Last Accessed Sep. 15, 2012
-
Windows ISV Software Security Defenses. http://msdn.microsoft.com/en-us/ library/bb430720. Last Accessed Sep. 15, 2012.
-
Windows ISV Software Security Defenses
-
-
-
5
-
-
34547461216
-
A comparison of software and hardware techniques for x86 virtualization
-
San Jose, CA, Oct.
-
K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS, San Jose, CA, Oct. 2006.
-
(2006)
ASPLOS
-
-
Adams, K.1
Agesen, O.2
-
6
-
-
60649106745
-
Automatic inference and enforcement of kernel data structures invariants
-
Anaheim, CA, Dec.
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structures invariants. In ACSAC, Anaheim, CA, Dec. 2008.
-
(2008)
ACSAC
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
7
-
-
33845867538
-
Xen and the art of virtualization
-
Bolton Landing, NY, Oct.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
-
(2003)
ACM SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
82655178636
-
The Turtles project: Design and implementation of nested virtualization
-
M. Ben-Yahuda, M. D. Day, Z. Dubitsky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B. Yassour. The Turtles project: Design and implementation of nested virtualization. In OSDI, 2010.
-
(2010)
OSDI
-
-
Ben-Yahuda, M.1
Day, M.D.2
Dubitsky, Z.3
Factor, M.4
Har'el, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.9
-
9
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Apr.
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre, Apr. 1977.
-
(1977)
Technical Report MTR-3153 Mitre
-
-
Biba, K.J.1
-
10
-
-
85084162449
-
The slab allocator: An object-caching kernel memory allocator
-
Boston, MA, June
-
J. Bonwick. The slab allocator: An object-caching kernel memory allocator. In USENIX, Boston, MA, June 1994.
-
(1994)
USENIX
-
-
Bonwick, J.1
-
11
-
-
84872120029
-
Fast byte-granularity software fault isolation
-
Big Sky, Montana, Oct.
-
M. Castro, M. Costa, J.-P. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black. Fast byte-granularity software fault isolation. In ACM SOSP, Big Sky, Montana, Oct. 2009.
-
(2009)
ACM SOSP
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
12
-
-
77950803388
-
Secure web applications via automatic partitioning
-
Stevenson, WA, Oct.
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In ACM SOSP, Stevenson, WA, Oct. 2007.
-
(2007)
ACM SOSP
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
13
-
-
85060818077
-
Introduction and overview of the Multics system
-
Las Vegas, NV, Nov.
-
F. Corbato and V. Vyssotsky. Introduction and overview of the Multics system. In Fall Joint Computer Conference, Las Vegas, NV, Nov. 1965.
-
(1965)
Fall Joint Computer Conference
-
-
Corbato, F.1
Vyssotsky, V.2
-
14
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Alexandria, VA, Oct.
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: Malware analysis via hardware virtualization extensions. In ACM CCS, Alexandria, VA, Oct. 2008.
-
(2008)
ACM CCS
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
15
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Seattle, WA, Nov.
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, Seattle, WA, Nov. 2006.
-
(2006)
OSDI
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
16
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, Oct.
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In ACM SOSP, Bolton Landing, NY, Oct. 2003.
-
(2003)
ACM SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
17
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
San Diego, CA, Feb.
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, San Diego, CA, Feb. 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
18
-
-
27544459540
-
-
Intel, Intel 64 and IA-32 Architectures Software Developer's Manual
-
Intel. System Programming Guide: Part 2. Intel 64 and IA-32 Architectures Software Developer's Manual, 2004.
-
(2004)
System Programming Guide: Part 2
-
-
-
19
-
-
84872111868
-
Stealthy malware detection through VMM-based 'out-of-the-box' semantic view
-
Alexandria, VA, Nov.
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through VMM-based 'out-of-the-box' semantic view. In ACM CCS, Alexandria, VA, Nov. 2007.
-
(2007)
ACM CCS
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
20
-
-
84872113652
-
VMM-based hidden process detection and identification using Lycosid
-
Seattle, WA, Mar.
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. VMM-based hidden process detection and identification using Lycosid. In ACM VEE, Seattle, WA, Mar. 2008.
-
(2008)
ACM VEE
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
21
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
Oakland, CA, May
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
22
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
San Jose, CA, Aug.
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In USENIX Security Symposium, San Jose, CA, Aug. 2008.
-
(2008)
USENIX Security Symposium
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
23
-
-
84872105546
-
-
Last accessed Sep. 15, 2012
-
Microsoft. PatchGuard. http://blogs.msdn.com/windowsvistasecurity/ archive/2006/08/11/695993.aspx. Last accessed Sep. 15, 2012.
-
Microsoft. PatchGuard
-
-
-
24
-
-
1542355459
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
Grenoble, France, Apr.
-
G. C. Necula, S. McPeak, S. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Conference on Compiler Construction (CC), Grenoble, France, Apr. 2002.
-
(2002)
Conference on Compiler Construction (CC)
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
25
-
-
84872119713
-
-
Last accessed Sep. 15, 2012
-
Packet Storm. All-root. http://packetstormsecurity.org/UNIX/penetration/ rootkits/all-root.c. Last accessed Sep. 15, 2012.
-
All-root
-
-
-
26
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Miami, FL, Dec.
-
B. D. Payne, M. Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In ACSAC, Miami, FL, Dec. 2007.
-
(2007)
ACSAC
-
-
Payne, B.D.1
Carbone, M.2
Lee, W.3
-
27
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA, May
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
28
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, BC, Canada, Aug.
-
N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, Vancouver, BC, Canada, Aug. 2006.
-
(2006)
USENIX Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
29
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
Alexandria, VA, Nov.
-
N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In ACM CCS, Alexandria, VA, Nov. 2007.
-
(2007)
ACM CCS
-
-
Petroni Jr., N.L.1
Hicks, M.2
-
30
-
-
77949482509
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Boston, MA, Sept.
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, Boston, MA, Sept. 2008.
-
(2008)
RAID
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
32
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
Tucson, AZ, Dec.
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen open-source hypervisor. In ACSAC, Tucson, AZ, Dec. 2005.
-
(2005)
ACSAC
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
33
-
-
77955224892
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson, WA, Oct.
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP, Stevenson, WA, Oct. 2007.
-
(2007)
ACM SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
34
-
-
79959884555
-
Exploiting hardware advances for software testing and debugging
-
Honolulu, HI, May
-
M. L. Soffa, K. R. Walcott, and J. Mars. Exploiting hardware advances for software testing and debugging. In ICSE, Honolulu, HI, May 2011.
-
(2011)
ICSE
-
-
Soffa, M.L.1
Walcott, K.R.2
Mars, J.3
-
35
-
-
80052013311
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Boston, MA, Sept.
-
A. Srivastava and J. Giffin. Tamper-resistant, application-aware blocking of malicious network connections. In RAID, Boston, MA, Sept. 2008.
-
(2008)
RAID
-
-
Srivastava, A.1
Giffin, J.2
-
36
-
-
84872104166
-
Automatic discovery of parasitic malware
-
Ottawa, Canada, Sept.
-
A. Srivastava and J. Giffin. Automatic discovery of parasitic malware. In RAID, Ottawa, Canada, Sept. 2010.
-
(2010)
RAID
-
-
Srivastava, A.1
Giffin, J.2
-
37
-
-
84867864575
-
Efficient monitoring of untrusted kernel-mode execution
-
San Diego, California, Feb.
-
A. Srivastava and J. Giffin. Efficient monitoring of untrusted kernel-mode execution. In NDSS, San Diego, California, Feb. 2011.
-
(2011)
NDSS
-
-
Srivastava, A.1
Giffin, J.2
-
38
-
-
84898956771
-
Operating system interface obfuscation and the revealing of hidden operations
-
Netherlands, July
-
A. Srivastava, A. Lanzi, J. Giffin, and D. Balzarotti. Operating system interface obfuscation and the revealing of hidden operations. In DIMVA, Netherlands, July 2011.
-
(2011)
DIMVA
-
-
Srivastava, A.1
Lanzi, A.2
Giffin, J.3
Balzarotti, D.4
-
39
-
-
84872112887
-
-
Last accessed Sep. 15, 2012
-
Symantec. Windows rootkit overview. http://www.symantec.com/avcenter/ reference/windows.rootkit.overview.pdf. Last accessed Sep. 15, 2012.
-
Windows Rootkit Overview
-
-
-
40
-
-
84872121334
-
UBRA. Process hiding and the Linux scheduler
-
Jan.
-
ubra. Process hiding and the Linux scheduler. Phrack, 11(63), Jan. 2005.
-
(2005)
Phrack
, vol.11
, Issue.63
-
-
-
41
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Chicago, IL, Nov.
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In ACM CCS, Chicago, IL, Nov. 2009.
-
(2009)
ACM CCS
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
42
-
-
0036957412
-
Mondrian memory protection
-
San Jose, CA, Oct.
-
E. Witchel, J. Cates, and K. Asanovic. Mondrian memory protection. In ASPLOS, San Jose, CA, Oct. 2002.
-
(2002)
ASPLOS
-
-
Witchel, E.1
Cates, J.2
Asanovic, K.3
-
43
-
-
85093189156
-
Practical protection of kernel integrity for commodity OS from untrusted extensions
-
San Diego, California, Feb.
-
X. Xiong, D. Tian, and P. Liu. Practical protection of kernel integrity for commodity os from untrusted extensions. In NDSS, San Diego, California, Feb. 2011.
-
(2011)
NDSS
-
-
Xiong, X.1
Tian, D.2
Liu, P.3
|