-
2
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
New York, NY, USA ACM
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 38-49, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
3
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
Anaheim, California, December
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In Proceedings of the 2008 Annual Computer Security Applications Conference (ACSAC08), pages 77-86, Anaheim, California, December 2008.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference (ACSAC08)
, pp. 77-86
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
4
-
-
84881126150
-
-
U. Becker. Ddr2-sdram controller
-
U. Becker. Ddr2-sdram controller.
-
-
-
-
5
-
-
84859464490
-
The gem5 simulator
-
Aug.
-
N. Binkert, B. Beckmann, G. Black, S. K. Reinhardt, A. Saidi, A. Basu, J. Hestness, D. R. Hower, T. Krishna, S. Sardashti, R. Sen, K. Sewell, M. Shoaib, N. Vaish, M. D. Hill, and D. A. Wood. The gem5 simulator. SIGARCH Comput. Archit. News, 39:1-7, Aug. 2011.
-
(2011)
SIGARCH Comput. Archit. News
, vol.39
, pp. 1-7
-
-
Binkert, N.1
Beckmann, B.2
Black, G.3
Reinhardt, S.K.4
Saidi, A.5
Basu, A.6
Hestness, J.7
Hower, D.R.8
Krishna, T.9
Sardashti, S.10
Sen, R.11
Sewell, K.12
Shoaib, M.13
Vaish, N.14
Hill, M.D.15
Wood, D.A.16
-
6
-
-
33846535493
-
The m5 simulator: Modeling networked systems
-
July
-
N. L. Binkert, R. G. Dreslinski, L. R. Hsu, K. T. Lim, A. G. Saidi, and S. K. Reinhardt. The m5 simulator: Modeling networked systems. IEEE Micro, 26(4):52-60, July 2006.
-
(2006)
IEEE Micro
, vol.26
, Issue.4
, pp. 52-60
-
-
Binkert, N.L.1
Dreslinski, R.G.2
Hsu, L.R.3
Lim, K.T.4
Saidi, A.G.5
Reinhardt, S.K.6
-
7
-
-
84881128040
-
Hijacking linux page fault handler
-
Buffer 0×0B, 0×3D, Phile#0×07 of 0×0f
-
Buffer. Hijacking linux page fault handler. Phrack Magazine, 0×0B, 0×3D, Phile#0×07 of 0×0f, 2003.
-
(2003)
Phrack Magazine
-
-
-
9
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
Chicago, IL, USA
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In The 16th ACM Conference on Computer and Communications Security (CCS'09), pages 555-565, Chicago, IL, USA, 2009.
-
(2009)
The 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 555-565
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
10
-
-
74049118754
-
Robust signatures for kernel data structures
-
Chicago, Illinois, USA ACM
-
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), pages 566-577, Chicago, Illinois, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 566-577
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
12
-
-
84881181635
-
-
Elpida. Fully buffered dimm - main memory for advanced performance
-
Elpida. Fully buffered dimm - main memory for advanced performance.
-
-
-
-
13
-
-
70249116478
-
Smm rootkits: A new breed of os independent malware
-
S. Embleton, S. Sparks, and C. Zou. Smm rootkits: a new breed of os independent malware. In Proceedings of the 4th international conference on Security and privacy in communication netowrks, Secure Comm'08, pages 11:1-11:12, 2008.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, Secure Comm'08
, pp. 111-1112
-
-
Embleton, S.1
Sparks, S.2
Zou, C.3
-
14
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection
-
San Francisco, CA, May
-
Y. Fu and Z. Lin. Space traveling across vm: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
-
-
Fu, Y.1
Lin, Z.2
-
15
-
-
84875870787
-
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
-
Houston, TX, March
-
Y. Fu and Z. Lin. Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery. In Proceedings of the 9th Annual International Conference on Virtual Execution Environments, Houston, TX, March 2013.
-
(2013)
Proceedings of the 9th Annual International Conference on Virtual Execution Environments
-
-
Fu, Y.1
Lin, Z.2
-
17
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
San Jose, CA, October
-
Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin. Os-sommelier: Memory-only operating system fingerprinting in the cloud. In Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC'12), San Jose, CA, October 2012.
-
(2012)
Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC'12)
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
19
-
-
36849034066
-
Spec cpu2006 benchmark descriptions
-
Sept.
-
J. L. Henning. Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34(4):1-17, Sept. 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, Issue.4
, pp. 1-17
-
-
Henning, J.L.1
-
20
-
-
84881163003
-
Wishbone system-on-chip (soc) interconnection architecture for portable ip cores, rev. Version: B4
-
R. Herveille. Wishbone system-on-chip (soc) interconnection architecture for portable ip cores, rev. version: B4. By Open Cores Organization, 2010.
-
(2010)
By Open Cores Organization
-
-
Herveille, R.1
-
21
-
-
79953070187
-
Ensuring operating system kernel integrity with osck
-
Newport Beach, California, USA
-
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with osck. In Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '11, pages 279-290, Newport Beach, California, USA, 2011.
-
(2011)
Proceedings of the Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '11
, pp. 279-290
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
25
-
-
77952336652
-
Vmm-based hidden process detection and identification using lycosid
-
Seattle, WA
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Vmm-based hidden process detection and identification using lycosid. In Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 91-100, Seattle, WA, 2008.
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
26
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
S. T. King, P. M. Chen, Y. min Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. Subvirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy, pages 314-327, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Min Wang, Y.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
27
-
-
84961990257
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang. Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
28
-
-
33748870886
-
Multifacet's general execution-driven multiprocessor simulator (gems) toolset
-
Nov.
-
M. M. K. Martin, D. J. Sorin, B. M. Beckmann, M. R. Marty, M. Xu, A. R. Alameldeen, K. E. Moore, M. D. Hill, and D. A. Wood. Multifacet's general execution-driven multiprocessor simulator (gems) toolset. SIGARCH Comput. Archit. News, 33(4):92-99, Nov. 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.4
, pp. 92-99
-
-
Martin, M.M.K.1
Sorin, D.J.2
Beckmann, B.M.3
Marty, M.R.4
Xu, M.5
Alameldeen, A.R.6
Moore, K.E.7
Hill, M.D.8
Wood, D.A.9
-
29
-
-
84881173780
-
-
Master of Science Thesis, Department of Electrical and Computer Engineering, University of Maryland, College Park
-
R. Marwan. Fbsim and the fully buffered dimm memory system architecture. Master of Science Thesis, Department of Electrical and Computer Engineering, University of Maryland, College Park.
-
Fbsim and the Fully Buffered Dimm Memory System Architecture
-
-
Marwan, R.1
-
30
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
Glasgow, Scotland UK
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for tcb minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08, pages 315-328, Glasgow, Scotland UK, 2008.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Eurosys '08
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
31
-
-
84869408742
-
Vigilare: Toward snoop-based kernel integrity monitor
-
New York, NY, USA ACM
-
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. B. Kang. Vigilare: toward snoop-based kernel integrity monitor. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 28-37, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 28-37
-
-
Moon, H.1
Lee, H.2
Lee, J.3
Kim, K.4
Paek, Y.5
Kang, B.B.6
-
32
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, B.C., Canada, August USENIX Association
-
N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C., Canada, August 2006. USENIX Association.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
33
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. L. Petroni, J. Timothy, F. Jesus, M. William, and A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In In Proceedings of the 13th USENIX Security Symposium, pages 179-194, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni, N.L.1
Timothy, J.2
Jesus, F.3
William, M.4
Arbaugh, A.5
-
34
-
-
79959550547
-
Dramsim2: A cycle accurate memory system simulator
-
Jan.
-
P. Rosenfeld, E. Cooper-Balis, and B. Jacob. Dramsim2: A cycle accurate memory system simulator. IEEE Comput. Archit. Lett., 10(1):16-19, Jan. 2011.
-
(2011)
IEEE Comput. Archit. Lett.
, vol.10
, Issue.1
, pp. 16-19
-
-
Rosenfeld, P.1
Cooper-Balis, E.2
Jacob, B.3
-
35
-
-
77952255373
-
Beyond the cpu: Defeating hardware based ram acquisition tools
-
J. Rutkowska. Beyond the cpu: Defeating hardware based ram acquisition tools. In Black Hat USA, 2007.
-
(2007)
Black Hat USA
-
-
Rutkowska, J.1
-
38
-
-
84881125216
-
-
R. Usselmann. Wishbone dma/bridge ip core
-
R. Usselmann. Wishbone dma/bridge ip core.
-
-
-
-
39
-
-
78249271707
-
Hypercheck: A hardware-assisted integrity monitor
-
Berlin, Heidelberg Springer-Verlag
-
J. Wang, A. Stavrou, and A. Ghosh. Hypercheck: a hardware-assisted integrity monitor. In Proceedings of the 13th international conference on Recent advances in intrusion detection, RAID'10, pages 158-177, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection, RAID'10
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
40
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
2010 IEEE Symposium on may
-
Z. Wang and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 380-395, may 2010.
-
(2010)
Security and Privacy (SP)
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
41
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Chicago, Illinois
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM conference on Computer and communications security, pages 545-554, Chicago, Illinois, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
42
-
-
60649107135
-
Soft-timer driven transient kernel control flow attacks and defense
-
J. Wei, B. D. Payne, J. Giffin, and C. Pu. Soft-timer driven transient kernel control flow attacks and defense. In Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC '08, pages 97-107, 2008.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC '08
, pp. 97-107
-
-
Wei, J.1
Payne, B.D.2
Giffin, J.3
Pu, C.4
-
43
-
-
67249098186
-
Subverting the xen hypervisor
-
R. Wojtczuk. Subverting the Xen hypervisor. In Black Hat USA, 2008.
-
(2008)
Black Hat USA
-
-
Wojtczuk, R.1
-
44
-
-
70450284743
-
Decoupled dimm: Building high-bandwidth memory system using low-speed dram devices
-
New York, NY, USA ACM
-
H. Zheng, J. Lin, Z. Zhang, and Z. Zhu. Decoupled dimm: building high-bandwidth memory system using low-speed dram devices. In Proceedings of the 36th annual international symposium on Computer architecture, ISCA '09, pages 255-266, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 36th Annual International Symposium on Computer Architecture, ISCA '09
, pp. 255-266
-
-
Zheng, H.1
Lin, J.2
Zhang, Z.3
Zhu, Z.4
|