-
1
-
-
84883381095
-
-
Sony, Rootkits and Digital Rights Management Gone Too Far
-
Sony, Rootkits and Digital Rights Management Gone Too Far, http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/ sonyrootkits-and-digital-rights-management-gone-too-far.aspx.
-
-
-
-
2
-
-
84883327779
-
-
Legit bootkits, http://www.securelist.com/en/analysis/204792203/Legit bootkits.
-
-
-
-
3
-
-
84883359729
-
-
Infecting loadable kernel modules
-
Infecting loadable kernel modules, http://www.phrack.org/issues. html?issue=61&id=10#article.
-
-
-
-
4
-
-
84883359644
-
-
Infecting loadable kernel modules kernel versions 2.6.x/3.0.x
-
Infecting loadable kernel modules kernel versions 2.6.x/3.0.x, http://www.phrack.org/issues.html?issue=68&id=11#article.
-
-
-
-
5
-
-
84883380872
-
-
Module injection in 2.6 kernel
-
Module injection in 2.6 kernel, http://www.linuxforum.net/forum/showflat. php?Cat=&Board=security&Number=536404&page=0&view= collapsed&sb=5&o=31&fpart.
-
-
-
-
6
-
-
84883311275
-
-
Driverless Kernel Mode Rootkit
-
Driverless Kernel Mode Rootkit, http://www.rohitab.com/discuss/topic/ 28440-driverless-kernel-mode-rootkit.
-
-
-
-
7
-
-
84883410896
-
-
Kernel Driver Backdooring
-
Kernel Driver Backdooring, http://securitylabs.websense.com/content/ Blogs/2730.aspx.
-
-
-
-
8
-
-
84883377791
-
-
The ERESI Reverse Engineering Software Interface
-
The ERESI Reverse Engineering Software Interface, http://www.eresi- project.org.
-
-
-
-
9
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
M. M. Swift, B. N. Bershad, and H. M. Levy, Improving the Reliability of Commodity Operating Systems, in Proceedings of the nineteenth ACM symposium on Operating systems principles, ser. SOSP '03. ACM, 2003, pp. 207-222.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, Ser. SOSP '03. ACM
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
13
-
-
34748831643
-
Thorough static analysis of device drivers
-
T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, and A. Ustuner, Thorough Static Analysis of Device Drivers, in Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, ser. EuroSys '06. ACM, 2006, pp. 73-85.
-
(2006)
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, Ser. EuroSys '06. ACM
, pp. 73-85
-
-
Ball, T.1
Bounimova, E.2
Cook, B.3
Levin, V.4
Lichtenberg, J.5
McGarvey, C.6
Ondrusek, B.7
Rajamani, S.K.8
Ustuner, A.9
-
14
-
-
79953099806
-
Testing closed-source binary device drivers with ddt
-
V. Kuznetsov, V. Chipounov, and G. Candea, Testing Closed-Source Binary Device Drivers with DDT, in Proceedings of the 2010 USENIX conference on USENIX annual technical conference. USENIX Association, 2010, pp. 12-12.
-
(2010)
Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference. USENIX Association
, pp. 12-12
-
-
Kuznetsov, V.1
Chipounov, V.2
Candea, G.3
-
15
-
-
84883329593
-
-
Linux Test Project
-
Linux Test Project, http://ltp.sourceforge.net.
-
-
-
-
17
-
-
84883417861
-
-
curl-loader, http://curl-loader.sourceforge.net.
-
-
-
-
18
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. Engler, KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, in Proceedings of the 8th USENIX conference on Operating systems design and implementation. USENIX Association, 2008, pp. 209-224.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. USENIX Association
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
19
-
-
84877705477
-
SymDrive: Testing drivers without devices
-
M. J. Renzelmann, A. Kadav, and M. M. Swift, SymDrive: Testing Drivers without Devices, in Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation. USENIX Association, 2012, pp. 279-292.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. USENIX Association
, pp. 279-292
-
-
Renzelmann, M.J.1
Kadav, A.2
Swift, M.M.3
-
21
-
-
32344447459
-
CUTE: A concolic unit testing engine for c
-
ser. ESEC/FSE-13. ACM
-
K. Sen, D. Marinov, and G. Agha, CUTE: A Concolic Unit Testing Engine for C, in Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, ser. ESEC/FSE-13. ACM, 2005, pp. 263-272.
-
(2005)
Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
23
-
-
38149080457
-
Probing the guts of kprobes
-
A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, and M. Hiramatsu, Probing the Guts of Kprobes, in Proceedings of the 2006 Linux Symposium, vol. 2, 2006, pp. 109-124.
-
(2006)
Proceedings of the 2006 Linux Symposium
, vol.2
, pp. 109-124
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
24
-
-
84883417548
-
-
Linux kernel module that allows you to set events on pressed keys
-
Linux kernel module that allows you to set events on pressed keys, http://en.chuso.net/linux-kernel-module-that-allows-you-to-setevents-on-pressed- keys.html.
-
-
-
-
25
-
-
84908296347
-
SafeDrive: Safe and recoverable extensions using language-based techniques
-
F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer, SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques, in Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association, 2006, pp. 45-60.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation. USENIX Association
, pp. 45-60
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
-
26
-
-
77957808684
-
The design and implementation of microdrivers
-
V. Ganapathy, M. J. Renzelmann, A. Balakrishnan, M. M. Swift, and S. Jha, The Design and Implementation of Microdrivers, in Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, ser. ASPLOS XIII. ACM, 2008, pp. 168-178.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, Ser. ASPLOS XIII. ACM
, pp. 168-178
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
27
-
-
85076907815
-
Device driver safety through a reference validation mechanism
-
D. Williams, P. Reynolds, K. Walsh, E. Sirer, and F. Schneider, Device Driver Safety Through a Reference Validation Mechanism, in Proceedings of the 8th USENIX conference on Operating systems design and implementation. USENIX Association, 2008, pp. 241-254.
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. USENIX Association
, pp. 241-254
-
-
Williams, D.1
Reynolds, P.2
Walsh, K.3
Sirer, E.4
Schneider, F.5
-
28
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM
-
R. Wahbe, S. Lucco, T. Anderson, and S. Graham, Efficient Software-Based Fault Isolation, in ACM SIGOPS Operating Systems Review, vol. 27, no. 5. ACM, 1994, pp. 203-216.
-
(1994)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
Graham, S.4
-
29
-
-
78651539599
-
XFI: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula, XFI: Software Guards for System Address Spaces, in Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association, 2006, pp. 75-88.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation. USENIX Association
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
31
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, Native Client: A Sandbox for Portable, Untrusted x86 Native Code, in Security and Privacy, 2009 30th IEEE Symposium on. IEEE, 2009, pp. 79-93.
-
(2009)
Security and Privacy, 30th IEEE Symposium On. IEEE, 2009
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
32
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
M. Castro, M. Costa, J. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black, Fast Byte-Granularity Software Fault Isolation, in Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles. ACM, 2009, pp. 45-58.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. ACM
, pp. 45-58
-
-
Castro, M.1
Costa, M.2
Martin, J.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
33
-
-
82655175538
-
Software fault isolation with api integrity and multi-principal modules
-
Y. Mao, H. Chen, D. Zhou, X. Wang, N. Zeldovich, and M. Kaashoek, Software fault isolation with API integrity and multi-principal modules, in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, 2011, pp. 115-128.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM
, pp. 115-128
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M.6
-
34
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 116-127.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
37
-
-
56549113546
-
Countering persistent kernel rootkits through systematic hook discovery
-
Z. Wang, X. Jiang, W. Cui, and X. Wang, Countering Persistent Kernel Rootkits Through Systematic Hook Discovery, in Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2008, pp. 21-38.
-
(2008)
Recent Advances in Intrusion Detection. Springer Berlin Heidelberg
, pp. 21-38
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
38
-
-
70349128844
-
Multi-aspect profiling of kernel rootkit behavior
-
R. Riley, X. Jiang, and D. Xu, Multi-Aspect Profiling of Kernel Rootkit Behavior, in Proceedings of the 4th ACM European conference on Computer systems. ACM, 2009, pp. 47-60.
-
(2009)
Proceedings of the 4th ACM European Conference on Computer Systems. ACM
, pp. 47-60
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
39
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection, in Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 2011, pp. 297-312.
-
(2011)
Security and Privacy (SP), IEEE Symposium On. IEEE, 2011
, pp. 297-312
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
|