-
3
-
-
85084161234
-
MAPbox: Using parameterized behavior classes to confine applications
-
Anurag Acharya and Mandar Raje. MAPbox: Using parameterized behavior classes to confine applications. In USENIX Security, 2000.
-
(2000)
USENIX Security
-
-
Acharya, A.1
Raje, M.2
-
4
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
Arati Baliga, Vinod Ganapathy, and Liviu Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC, 2008.
-
(2008)
ACSAC
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
5
-
-
38149021673
-
Xen and the art of virtualization
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In SOSP, 2003.
-
(2003)
SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
84867854789
-
REMUS: A security-enhanced operating system
-
Massimo Bernaschi, Emanuele Gabrielli, and Luigi V. Mancini. REMUS: A security-enhanced operating system. TISSEC, 5(1), 2002.
-
(2002)
TISSEC
, vol.5
, Issue.1
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
7
-
-
39049153474
-
Using attribute-based access control to enable attribute-based messaging
-
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, and Himanshu Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
Bobba, R.1
Fatemieh, O.2
Khan, F.3
Gunter, C.A.4
Khurana, H.5
-
8
-
-
84875649201
-
Iago attacks: Why the system call API is a bad untrusted RPC interface
-
March
-
Stephen Checkoway and Hovav Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In ASPLOS, March 2013.
-
(2013)
ASPLOS
-
-
Checkoway, S.1
Shacham, H.2
-
9
-
-
0035703699
-
When virtual is better than real
-
Peter M. Chen and Brian D. Noble. When virtual is better than real. In HotOS, pages 133-, 2001.
-
(2001)
HotOS
, pp. 133
-
-
Chen, P.M.1
Noble, B.D.2
-
10
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. Non-control-data attacks are realistic threats. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
11
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
May
-
Xioaxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffery Dwoskin, and Dan R. K. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ASPLOS, May 2008.
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
12
-
-
84875674777
-
A role and attribute based access control system using semantic web technologies
-
Lorenzo Cirio, Isabel F. Cruz, and Roberto Tamassia. A role and attribute based access control system using semantic web technologies. In OTM, 2007.
-
(2007)
OTM
-
-
Cirio, L.1
Cruz, I.F.2
Tamassia, R.3
-
14
-
-
84875648248
-
-
Oakland, May
-
Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon Giffin, and Wenke Lee. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Oakland, May 2011.
-
(2011)
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
15
-
-
78649997202
-
Leveraging legacy code to deploy desktop applications on the web
-
John R. Douceur, Jeremy Elson, Jon Howell, and Jacob R. Lorch. Leveraging legacy code to deploy desktop applications on the web. In OSDI, 2008.
-
(2008)
OSDI
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
17
-
-
60649112256
-
Virtual machine introspection for cognitive immunity
-
VICI
-
Timothy Fraser, Matthew R. Evenson, and William A. Arbaugh. VICI-virtual machine introspection for cognitive immunity. In ACSAC, pages 87-96, 2008.
-
(2008)
ACSAC
, pp. 87-96
-
-
Fraser, T.1
Evenson, M.R.2
Arbaugh, W.A.3
-
18
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP, October 2003.
-
(2003)
SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
20
-
-
79953070187
-
Ensuring operating system kernel integrity with OSck
-
March
-
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, and Emmett Witchel. Ensuring operating system kernel integrity with OSck. In ASPLOS, March 2011.
-
(2011)
ASPLOS
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
21
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Ralf Hund, Thorsten Holz, and Felix C. Freiling. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
22
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
Kapil Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In NDSS, 2000.
-
(2000)
NDSS
-
-
Jain, K.1
Sekar, R.2
-
23
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction
-
Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction. In CCS, pages 128-138, 2007.
-
(2007)
CCS
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
25
-
-
84889023382
-
Making linux protection mechanisms egalitarian with UserFS
-
USENIX Association
-
Taesoo Kim and Nickolai Zeldovich. Making linux protection mechanisms egalitarian with UserFS. In USENIX Security. USENIX Association, 2010.
-
(2010)
USENIX Security
-
-
Kim, T.1
Zeldovich, N.2
-
26
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
ACM Press
-
David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, pages 178-192. ACM Press, 2003.
-
(2003)
SOSP
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
28
-
-
78650207012
-
-
Oakland, May
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. TrustVisor: Efficient TCB reduction and attestation. In Oakland, May 2010.
-
(2010)
TrustVisor: Efficient TCB Reduction and Attestation
-
-
Mccune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
29
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
April
-
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, April 2008.
-
(2008)
EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
30
-
-
85084160699
-
LMbench: Portable tools for performance analysis
-
Berkeley, CA, USA, USENIX Association
-
Larry McVoy and Carl Staelin. LMbench: portable tools for performance analysis. In USENIX, pages 23-23, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
USENIX
, pp. 23-23
-
-
McVoy, L.1
Staelin, C.2
-
33
-
-
84875678402
-
-
Oakland
-
Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, and Jonathan M.McCune. Memoir: Practical state continuity for protected modules. In Oakland, 2011.
-
(2011)
Memoir: Practical State Continuity for Protected Modules
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
34
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Bryan D. Payne, Martim D. P. de A. Carbone, and Wenke Lee. Secure and flexible monitoring of virtual machines. In ACSAC, 2007.
-
(2007)
ACSAC
-
-
Payne, B.D.1
DeCarbone, M.D.P.2
Lee, W.3
-
35
-
-
77954972405
-
Towards application security on untrusted operating systems
-
San Jose, CA, USA, USENIX
-
Dan R. K. Ports and Tal Garfinkel. Towards application security on untrusted operating systems. In HotSec, San Jose, CA, USA, 2008. USENIX.
-
(2008)
HotSec
-
-
Ports, D.R.K.1
Garfinkel, T.2
-
36
-
-
84860531993
-
Apiary: Easy-to-use desktop application fault containment on commodity operating systems
-
Shaya Potter and Jason Nieh. Apiary: Easy-to-use desktop application fault containment on commodity operating systems. In USENIX, 2010.
-
(2010)
USENIX
-
-
Potter, S.1
Nieh, J.2
-
37
-
-
84878346861
-
Improving host security with system call policies
-
Neils Provos. Improving host security with system call policies. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Provos, N.1
-
38
-
-
35248835511
-
Towards a tamperresistant kernel rootkit detector
-
Nguyen Anh Quynh and Yoshiyasu Takefuji. Towards a tamperresistant kernel rootkit detector. In SAC, 2007.
-
(2007)
SAC
-
-
Quynh, N.A.1
Takefuji, Y.2
-
39
-
-
70349665533
-
Defeating dynamic data kernel rootkit attacks via VMM-based guesttransparent monitoring
-
Fukuoka, Japan, March
-
Junghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang. Defeating dynamic data kernel rootkit attacks via VMM-based guesttransparent monitoring. In ARES, Fukuoka, Japan, March 2009.
-
(2009)
ARES
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
40
-
-
78249267759
-
LiveDM: Temporal mapping of dynamic kernel memory for dynamic kernel malware analysis and debugging
-
West Lafayette, IN, February
-
Junghwan Rhee and Dongyan Xu. LiveDM: Temporal mapping of dynamic kernel memory for dynamic kernel malware analysis and debugging. Technical report, Purdue University, West Lafayette, IN, February 2010.
-
(2010)
Technical Report, Purdue University
-
-
Rhee, J.1
Xu, D.2
-
41
-
-
84875662256
-
-
Mike Ryan, Ted Faber, Mei-Hui Su, John Wroclawski, and Steve Schwab. A.B A.C. http://abac.deterlab.net/, 2012.
-
(2012)
A.B A.C.
-
-
Ryan, M.1
Faber, T.2
Su, M.-H.3
Wroclawski, J.4
Schwab, S.5
-
42
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP, pages 335-350, 2007.
-
(2007)
SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
43
-
-
77952351839
-
The geometry of innocent flesh on the bone: Returnintolibc without function calls (on the x86)
-
ACM Press, October
-
Hovav Shacham. The geometry of innocent flesh on the bone: Returnintolibc without function calls (on the x86). In CCS, pages 552-61. ACM Press, October 2007.
-
(2007)
CCS
, pp. 552-561
-
-
Shacham, H.1
-
44
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
Richard Ta-min, Lionel Litty, and David Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In OSDI, pages 279-292, 2006.
-
(2006)
OSDI
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
45
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In CCS, 2009.
-
(2009)
CCS
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
46
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
Min Xu, Xuxian Jiang, Ravi Sandhu, and Xinwen Zhang. Towards a VMM-based usage control framework for OS kernel integrity protection. In SACMAT, 2007.
-
(2007)
SACMAT
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
47
-
-
77952404303
-
Using hypervisor to provide data secrecy for user applications on a per-page basis
-
Jisoo Yang and Kang G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, pages 71- 80, 2008.
-
(2008)
VEE
, pp. 71-80
-
-
Yang, J.1
Shin, K.G.2
-
48
-
-
69149106605
-
-
Oakland
-
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In Oakland, pages 79-93, 2009.
-
(2009)
Native Client: A Sandbox for Portable, Untrusted X86 Native Code
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
49
-
-
82655179240
-
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
-
(2011)
SOSP
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|