-
2
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
May
-
M. Rosenblum and T. Garfinkel, "Virtual machine monitors: Current technology and future trends," IEEE Computer, May 2005.
-
(2005)
IEEE Computer
-
-
Rosenblum, M.1
Garfinkel, T.2
-
4
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. I. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization," in Proc. of 2008 IEEE Symposium on Security and Privacy, May 2008.
-
Proc. of 2008 IEEE Symposium on Security and Privacy, May 2008
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.I.3
Lee, W.4
-
6
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: malware analysis via hardware virtualization extensions," in Proc. of the 15th ACM conference on Computer and communications security (CCS'08), October 2008.
-
Proc. of the 15th ACM Conference on Computer and Communications Security (CCS'08), October 2008
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
7
-
-
80755144012
-
Process out-grafting: An efficient "out-of-vm" approach for fine-grained process execution monitoring
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu, "Process out-grafting: an efficient "out-of-vm" approach for fine-grained process execution monitoring," in Proc. of the 18th ACM conference on Computer and communications security (CCS'11), October 2011.
-
Proc. of the 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
8
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
April
-
B. Hay and K. Nance, "Forensics examination of volatile system data using virtual introspection," SIGOPS Operating System Review, vol. 42, pp. 74-82, April 2008.
-
(2008)
SIGOPS Operating System Review
, vol.42
, pp. 74-82
-
-
Hay, B.1
Nance, K.2
-
10
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh, "Copilot - A coprocessor-based kernel runtime integrity monitor," in Proc. of the 13th USENIX Security Symposium, August 2004.
-
Proc. of the 13th USENIX Security Symposium, August 2004
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
13
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, "Virtuoso: Narrowing the semantic gap in virtual machine introspection," in Proc. of 2011 IEEE Symposium on Security and Privacy, May 2011.
-
Proc. of 2011 IEEE Symposium on Security and Privacy, May 2011
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
14
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song, "Binary code extraction and interface identification for security applications," in Proc. of the 17th Annual Network and Distributed System Security Symposium (NDSS'10), February 2010.
-
Proc. of the 17th Annual Network and Distributed System Security Symposium (NDSS'10), February 2010
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
15
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda, "Inspector gadget: Automated extraction of proprietary gadgets from malware binaries," in Proc. of 2010 IEEE Security and Privacy, May 2010.
-
Proc. of 2010 IEEE Security and Privacy, May 2010
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
18
-
-
85084160792
-
Understanding data lifetime via whole-system simulation
-
J. Chow, B. Pfaff, K. Christopher, and M. Rosenblum, "Understanding data lifetime via whole-system simulation," in Proc. of the 13th USENIX Security Symposium, 2004.
-
Proc. of the 13th USENIX Security Symposium, 2004
-
-
Chow, J.1
Pfaff, B.2
Christopher, K.3
Rosenblum, M.4
-
19
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Proc. of the 14th Annual Network and Distributed System Security Symposium (NDSS'05), February 2005.
-
Proc. of the 14th Annual Network and Distributed System Security Symposium (NDSS'05), February 2005
-
-
Newsome, J.1
Song, D.2
-
20
-
-
84903607772
-
Dynamic spyware analysis
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song, "Dynamic spyware analysis," in Proc. of the 2007 USENIX Annual Technical Conference (Usenix'07), June 2007.
-
Proc. of the 2007 USENIX Annual Technical Conference (Usenix'07), June 2007
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
21
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in Proc. of the 14th ACM Conferences on Computer and Communication Security (CCS'07), October 2007.
-
Proc. of the 14th ACM Conferences on Computer and Communication Security (CCS'07), October 2007
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
-
22
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for unix processes," in Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996.
-
Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
26
-
-
77955035426
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-3, January
-
H. Yin and D. Song, "Temu: Binary code analysis via whole-system layered annotative execution," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-3, January 2010.
-
(2010)
Temu: Binary Code Analysis Via Whole-system Layered Annotative Execution
-
-
Yin, H.1
Song, D.2
-
28
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, "Pin: Building customized program analysis tools with dynamic instrumentation," in Proc. of ACM SIGPLAN PLDI 2005.
-
Proc. of ACM SIGPLAN PLDI 2005
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
31
-
-
84961990257
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang, "Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures," in Proc. of the 18th Annual Network and Distributed System Security Symposium (NDSS'11), February 2011.
-
Proc. of the 18th Annual Network and Distributed System Security Symposium (NDSS'11), February 2011
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
33
-
-
78650574143
-
Dksm: Subverting virtual machine introspection for fun and profit
-
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu, "Dksm: Subverting virtual machine introspection for fun and profit," in Proc. of the 29th IEEE Symposium on Reliable Distributed Systems, 2010.
-
Proc. of the 29th IEEE Symposium on Reliable Distributed Systems, 2010
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
35
-
-
84885946797
-
Automatically bridging the semantic gap using a c interpreter
-
H. Inoue, F. Adelstein, M. Donovan, and S. Brueckner, "Automatically bridging the semantic gap using a c interpreter," in Proc. of the 2011 Annual Symposium on Information Assurance, June 2011.
-
Proc. of the 2011 Annual Symposium on Information Assurance, June 2011
-
-
Inoue, H.1
Adelstein, F.2
Donovan, M.3
Brueckner, S.4
-
36
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler, "Exe: Automatically generating inputs of death," in Proc. of the 13th ACM Conference on Computer and Communications Security (CCS'06). October 2006.
-
Proc. of the 13th ACM Conference on Computer and Communications Security (CCS'06). October 2006
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
38
-
-
77952403312
-
Polyglot: Automatic extraction of protocol format using dynamic binary analysis
-
J. Caballero, H. Yin, Z. Liang, and D. Song, "Polyglot: Automatic extraction of protocol format using dynamic binary analysis," in Proc. of the 14th ACM Conference on Computer and and Communications Security (CCS'07), October 2007.
-
Proc. of the 14th ACM Conference on Computer and and Communications Security (CCS'07), October 2007
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
39
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz, "Tupni: Automatic reverse engineering of input formats," in Proc. of the 15th ACM Conference on Computer and Communications Security (CCS'08), October 2008.
-
Proc. of the 15th ACM Conference on Computer and Communications Security (CCS'08), October 2008
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
40
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
Z. Lin, X. Jiang, D. Xu, and X. Zhang, "Automatic protocol format reverse engineering through context-aware monitored execution," in Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008.
-
Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
41
-
-
85180792232
-
Automatic Network Protocol Analysis
-
G. Wondracek, P. Milani, C. Kruegel, and E. Kirda, "Automatic Network Protocol Analysis," in Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008.
-
Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008
-
-
Wondracek, G.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
-
43
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang, "Mapping kernel objects to enable systematic integrity checking," in Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), October 2009.
-
Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), October 2009
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
|