메뉴 건너뛰기




Volumn , Issue , 2013, Pages 265-278

Inktag: Secure applications on an untrusted operating system

Author keywords

Application protection; Paraverification; Virtualization based security

Indexed keywords

ATTRIBUTE BASED ACCESS CONTROL; DECENTRALIZED ACCESS CONTROL; INVASIVE SOFTWARE; PARAVERIFICATION; SAFETY GUARANTEES; STATE OF THE ART; TRUSTED APPLICATIONS; VIRTUALIZATION-BASED SECURITIES;

EID: 84875683130     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2451116.2451146     Document Type: Conference Paper
Times cited : (137)

References (49)
  • 3
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using parameterized behavior classes to confine applications
    • Anurag Acharya and Mandar Raje. MAPbox: Using parameterized behavior classes to confine applications. In USENIX Security, 2000.
    • (2000) USENIX Security
    • Acharya, A.1    Raje, M.2
  • 4
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • Arati Baliga, Vinod Ganapathy, and Liviu Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC, 2008.
    • (2008) ACSAC
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 6
    • 84867854789 scopus 로고    scopus 로고
    • REMUS: A security-enhanced operating system
    • Massimo Bernaschi, Emanuele Gabrielli, and Luigi V. Mancini. REMUS: A security-enhanced operating system. TISSEC, 5(1), 2002.
    • (2002) TISSEC , vol.5 , Issue.1
    • Bernaschi, M.1    Gabrielli, E.2    Mancini, L.V.3
  • 7
    • 39049153474 scopus 로고    scopus 로고
    • Using attribute-based access control to enable attribute-based messaging
    • Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, and Himanshu Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC, 2006.
    • (2006) ACSAC
    • Bobba, R.1    Fatemieh, O.2    Khan, F.3    Gunter, C.A.4    Khurana, H.5
  • 8
    • 84875649201 scopus 로고    scopus 로고
    • Iago attacks: Why the system call API is a bad untrusted RPC interface
    • March
    • Stephen Checkoway and Hovav Shacham. Iago attacks: Why the system call API is a bad untrusted RPC interface. In ASPLOS, March 2013.
    • (2013) ASPLOS
    • Checkoway, S.1    Shacham, H.2
  • 9
    • 0035703699 scopus 로고    scopus 로고
    • When virtual is better than real
    • Peter M. Chen and Brian D. Noble. When virtual is better than real. In HotOS, pages 133-, 2001.
    • (2001) HotOS , pp. 133
    • Chen, P.M.1    Noble, B.D.2
  • 12
    • 84875674777 scopus 로고    scopus 로고
    • A role and attribute based access control system using semantic web technologies
    • Lorenzo Cirio, Isabel F. Cruz, and Roberto Tamassia. A role and attribute based access control system using semantic web technologies. In OTM, 2007.
    • (2007) OTM
    • Cirio, L.1    Cruz, I.F.2    Tamassia, R.3
  • 15
    • 78649997202 scopus 로고    scopus 로고
    • Leveraging legacy code to deploy desktop applications on the web
    • John R. Douceur, Jeremy Elson, Jon Howell, and Jacob R. Lorch. Leveraging legacy code to deploy desktop applications on the web. In OSDI, 2008.
    • (2008) OSDI
    • Douceur, J.R.1    Elson, J.2    Howell, J.3    Lorch, J.R.4
  • 17
    • 60649112256 scopus 로고    scopus 로고
    • Virtual machine introspection for cognitive immunity
    • VICI
    • Timothy Fraser, Matthew R. Evenson, and William A. Arbaugh. VICI-virtual machine introspection for cognitive immunity. In ACSAC, pages 87-96, 2008.
    • (2008) ACSAC , pp. 87-96
    • Fraser, T.1    Evenson, M.R.2    Arbaugh, W.A.3
  • 18
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • October
    • Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP, October 2003.
    • (2003) SOSP
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 20
    • 79953070187 scopus 로고    scopus 로고
    • Ensuring operating system kernel integrity with OSck
    • March
    • Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, and Emmett Witchel. Ensuring operating system kernel integrity with OSck. In ASPLOS, March 2011.
    • (2011) ASPLOS
    • Hofmann, O.S.1    Dunn, A.M.2    Kim, S.3    Roy, I.4    Witchel, E.5
  • 21
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • Ralf Hund, Thorsten Holz, and Felix C. Freiling. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 22
    • 85180753454 scopus 로고    scopus 로고
    • User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
    • Kapil Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In NDSS, 2000.
    • (2000) NDSS
    • Jain, K.1    Sekar, R.2
  • 23
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction
    • Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction. In CCS, pages 128-138, 2007.
    • (2007) CCS , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 24
    • 84894039099 scopus 로고    scopus 로고
    • Antfarm: Tracking processes in a virtual machine environment
    • Stephen T. Jones, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Antfarm: tracking processes in a virtual machine environment. In USENIX, 2006.
    • (2006) USENIX
    • Jones, S.T.1    Arpaci-Dusseau, A.C.2    Arpaci-Dusseau, R.H.3
  • 25
    • 84889023382 scopus 로고    scopus 로고
    • Making linux protection mechanisms egalitarian with UserFS
    • USENIX Association
    • Taesoo Kim and Nickolai Zeldovich. Making linux protection mechanisms egalitarian with UserFS. In USENIX Security. USENIX Association, 2010.
    • (2010) USENIX Security
    • Kim, T.1    Zeldovich, N.2
  • 26
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • ACM Press
    • David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, pages 178-192. ACM Press, 2003.
    • (2003) SOSP , pp. 178-192
    • Lie, D.1    Thekkath, C.A.2    Horowitz, M.3
  • 27
    • 84875665548 scopus 로고    scopus 로고
    • Linux kernel integrity measurement using contextual inspection
    • Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, and C. Durward McDonell. Linux kernel integrity measurement using contextual inspection. In STC, 2007.
    • (2007) STC
    • Loscocco, P.A.1    Wilson, P.W.2    Pendergrass, J.A.3    McDonell, C.D.4
  • 29
    • 55149108173 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for TCB minimization
    • April
    • Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, April 2008.
    • (2008) EuroSys
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 30
    • 85084160699 scopus 로고    scopus 로고
    • LMbench: Portable tools for performance analysis
    • Berkeley, CA, USA, USENIX Association
    • Larry McVoy and Carl Staelin. LMbench: portable tools for performance analysis. In USENIX, pages 23-23, Berkeley, CA, USA, 1996. USENIX Association.
    • (1996) USENIX , pp. 23-23
    • McVoy, L.1    Staelin, C.2
  • 34
    • 48649085344 scopus 로고    scopus 로고
    • Secure and flexible monitoring of virtual machines
    • Bryan D. Payne, Martim D. P. de A. Carbone, and Wenke Lee. Secure and flexible monitoring of virtual machines. In ACSAC, 2007.
    • (2007) ACSAC
    • Payne, B.D.1    DeCarbone, M.D.P.2    Lee, W.3
  • 35
    • 77954972405 scopus 로고    scopus 로고
    • Towards application security on untrusted operating systems
    • San Jose, CA, USA, USENIX
    • Dan R. K. Ports and Tal Garfinkel. Towards application security on untrusted operating systems. In HotSec, San Jose, CA, USA, 2008. USENIX.
    • (2008) HotSec
    • Ports, D.R.K.1    Garfinkel, T.2
  • 36
    • 84860531993 scopus 로고    scopus 로고
    • Apiary: Easy-to-use desktop application fault containment on commodity operating systems
    • Shaya Potter and Jason Nieh. Apiary: Easy-to-use desktop application fault containment on commodity operating systems. In USENIX, 2010.
    • (2010) USENIX
    • Potter, S.1    Nieh, J.2
  • 37
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Neils Provos. Improving host security with system call policies. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Provos, N.1
  • 38
    • 35248835511 scopus 로고    scopus 로고
    • Towards a tamperresistant kernel rootkit detector
    • Nguyen Anh Quynh and Yoshiyasu Takefuji. Towards a tamperresistant kernel rootkit detector. In SAC, 2007.
    • (2007) SAC
    • Quynh, N.A.1    Takefuji, Y.2
  • 39
    • 70349665533 scopus 로고    scopus 로고
    • Defeating dynamic data kernel rootkit attacks via VMM-based guesttransparent monitoring
    • Fukuoka, Japan, March
    • Junghwan Rhee, Ryan Riley, Dongyan Xu, and Xuxian Jiang. Defeating dynamic data kernel rootkit attacks via VMM-based guesttransparent monitoring. In ARES, Fukuoka, Japan, March 2009.
    • (2009) ARES
    • Rhee, J.1    Riley, R.2    Xu, D.3    Jiang, X.4
  • 40
    • 78249267759 scopus 로고    scopus 로고
    • LiveDM: Temporal mapping of dynamic kernel memory for dynamic kernel malware analysis and debugging
    • West Lafayette, IN, February
    • Junghwan Rhee and Dongyan Xu. LiveDM: Temporal mapping of dynamic kernel memory for dynamic kernel malware analysis and debugging. Technical report, Purdue University, West Lafayette, IN, February 2010.
    • (2010) Technical Report, Purdue University
    • Rhee, J.1    Xu, D.2
  • 42
    • 41149103393 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP, pages 335-350, 2007.
    • (2007) SOSP , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 43
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Returnintolibc without function calls (on the x86)
    • ACM Press, October
    • Hovav Shacham. The geometry of innocent flesh on the bone: Returnintolibc without function calls (on the x86). In CCS, pages 552-61. ACM Press, October 2007.
    • (2007) CCS , pp. 552-561
    • Shacham, H.1
  • 44
    • 85069458084 scopus 로고    scopus 로고
    • Splitting interfaces: Making trust between applications and operating systems configurable
    • Richard Ta-min, Lionel Litty, and David Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In OSDI, pages 279-292, 2006.
    • (2006) OSDI , pp. 279-292
    • Ta-Min, R.1    Litty, L.2    Lie, D.3
  • 45
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In CCS, 2009.
    • (2009) CCS
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 46
    • 34548043501 scopus 로고    scopus 로고
    • Towards a VMM-based usage control framework for OS kernel integrity protection
    • Min Xu, Xuxian Jiang, Ravi Sandhu, and Xinwen Zhang. Towards a VMM-based usage control framework for OS kernel integrity protection. In SACMAT, 2007.
    • (2007) SACMAT
    • Xu, M.1    Jiang, X.2    Sandhu, R.3    Zhang, X.4
  • 47
    • 77952404303 scopus 로고    scopus 로고
    • Using hypervisor to provide data secrecy for user applications on a per-page basis
    • Jisoo Yang and Kang G. Shin. Using hypervisor to provide data secrecy for user applications on a per-page basis. In VEE, pages 71- 80, 2008.
    • (2008) VEE , pp. 71-80
    • Yang, J.1    Shin, K.G.2
  • 49
    • 82655179240 scopus 로고    scopus 로고
    • CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
    • Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
    • (2011) SOSP
    • Zhang, F.1    Chen, J.2    Chen, H.3    Zang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.