-
1
-
-
84885892567
-
-
W∧X
-
W∧X, http://en.wikipedia.org/wiki/W-xor-X
-
-
-
-
2
-
-
84885883676
-
-
Rootkit Numbers Rocketing UP, McAfee Says
-
Rootkit Numbers Rocketing UP, McAfee Says (2006), http://news.cnet.com/ 2100-7349-3-6061878.html
-
(2006)
-
-
-
3
-
-
84885884023
-
-
AMD Virtualization (AMD-V) Technology (2009), http://sites.amd.com/us/ business/it-solutions/usage-models/virtualization/Pages/amd-v.aspx
-
(2009)
-
-
-
4
-
-
84885884178
-
-
Cooperation Grows in Fight Against Cybercrime
-
Cooperation Grows in Fight Against Cybercrime (2010), http://www.avertlabs.com/research/blog/index.php/category/rootkits-and-stealth- malware/
-
(2010)
-
-
-
6
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity Principles, Implementations, and Applications. ACM Transactions on Information and System Security 13(1), 1-40 (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
7
-
-
84885888005
-
-
Apache Http Server Project, http://httpd.apache.org/
-
-
-
-
9
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.L., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 164-177. ACM, New York (2003) (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
10
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
ACM, New York
-
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 27-38. ACM, New York (2008)
-
(2008)
CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
11
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
USENIX Association, Berkeley
-
Castro, M., Costa, M., Harris, T.: Securing Software by Enforcing Data-Flow Integrity. In: OSDI 2006: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 147-160. USENIX Association, Berkeley (2006)
-
(2006)
OSDI 2006: Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
12
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
DOI 10.1145/1346281.1346284, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems. In: ASPLOS XIII: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2-13. ACM, New York (2008) (Pubitemid 351585389)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
13
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
ACM, New York
-
Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. In: OSDI 2002: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp. 211-224. ACM, New York (2002)
-
(2002)
OSDI 2002: Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
17
-
-
77950853188
-
Stealthy malware detection through VMM-based "out-of-the-box," semantic view reconstruction
-
ACM, New York
-
Jiang, X., Wang, X., Xu, D.: Stealthy Malware Detection through VMM-based "Out-of-the-Box" Semantic View Reconstruction. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 128-138. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
18
-
-
84885885662
-
-
Klein, T.: ScoopyNG (2010), http://www.trapkit.de/research/vmm/scoopyng/
-
(2010)
ScoopyNG
-
-
Klein, T.1
-
25
-
-
72949120122
-
KvmSec: A security extension for linux kernel virtual machines
-
New York, NY
-
Lombardi, F., Di Pietro, R.: KvmSec: A Security Extension for Linux Kernel Virtual Machines. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, New York, NY, pp. 2029-2034 (2009)
-
(2009)
SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2029-2034
-
-
Lombardi, F.1
Di Pietro, R.2
-
26
-
-
77952329878
-
Improving xen security through disaggregation
-
ACM, New York
-
Murray, D.G., Milos, G., Hand, S.: Improving Xen Security through Disaggregation. In: VEE 2008: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 151-160. ACM, New York (2008)
-
(2008)
VEE 2008: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
27
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE Computer Society, Los Alamitos
-
Payne, B.D., Carbone, M., Sharif, M.I., Lee, W.: Lares: An Architecture for Secure Active Monitoring Using Virtualization. In: Oakland 2008: IEEE Symposium on Security and Privacy (S&P 2008), pp. 233-247. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Oakland 2008: Ieee Symposium on Security and Privacy (S&P 2008)
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.I.3
Lee, W.4
-
28
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
USENIX Association, Berkeley
-
Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - A Coprocessor-based Kernel Runtime Integrity Monitor. In: Security 2004: Proceedings of the 13th USENIX Security Symposium, pp. 179-194. USENIX Association, Berkeley (2004)
-
(2004)
Security 2004: Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
29
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
USENIX Association, Berkeley
-
Petroni, Jr., N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An Architecture for Specification-based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Security 2006: Proceedings of the 15th USENIX Security Symposium, pp. 289-304. USENIX Association, Berkeley (2006)
-
(2006)
Security 2006: Proceedings of the 15th USENIX Security Symposium
, pp. 289-304
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
31
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) LNCS Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
RAID 2008
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
32
-
-
77952396282
-
Virtual machine-provided context sensitive page mappings
-
ACM, New York
-
Rosenblum, N.E., Cooksey, G., Miller, B.P: Virtual Machine-provided Context Sensitive Page Mappings. In: VEE 2008: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 81-90. ACM, New York (2008)
-
(2008)
VEE 2008: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 81-90
-
-
Rosenblum, N.E.1
Cooksey, G.2
Miller, B.P.3
-
33
-
-
77955176901
-
-
Rutkowska, J.: Red Pill (2004), http://invisiblethings.org/papers/ redpill.html
-
(2004)
Red Pill
-
-
Rutkowska, J.1
-
36
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel code Integrity for Commodity OSes. In: SOSP 2007: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles, pp. 335-350. ACM, New York (2007) (Pubitemid 351429386)
-
(2007)
Operating Systems Review (ACM)
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
38
-
-
74049145643
-
Secure in-VM monitoring using hardware virtu-alization
-
ACM, New York
-
Sharif, M.I., Lee, W., Cui, W., Lanzi, A.: Secure In-VM Monitoring Using Hardware Virtu-alization. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 477-487. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
39
-
-
77952405499
-
Shadow walker.: Raising the bar for rootkit detection
-
Sparks, S., Butler, J.: Shadow Walker.: Raising the Bar for Rootkit Detection. In: Black Hat Japan (2005)
-
(2005)
Black Hat Japan
-
-
Sparks, S.1
Butler, J.2
-
40
-
-
27544461178
-
Detecting stealth software with Strider GhostBuster
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
Wang, Y.M., Beck, D., Vo, B., Roussev, R., Verbowski, C: Detecting Stealth Software with Strider GhostBuster. In: DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp. 368-377. IEEE Computer Society, Los Alamitos (2005) (Pubitemid 41538251)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 368-377
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
41
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE Computer Society, Los Alamitos
-
Wang, Z., Jiang, X.: HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In: Oakland 2010: IEEE Symposium on Security and Privacy (S&P 2010), pp. 380-398. IEEE Computer Society, Los Alamitos (2010)
-
(2010)
Oakland 2010: Ieee Symposium on Security and Privacy (S&P 2010)
, pp. 380-398
-
-
Wang, Z.1
Jiang, X.2
-
42
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM, New York
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering Kernel Rootkits with Lightweight Hook Protection. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 545-554. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
43
-
-
56549113546
-
Countering persistent kernel rootkits through systematic hook discovery
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) LNCS Springer, Heidelberg
-
Wang, Z., Jiang, X., Cui, W., Wang, X.: Countering Persistent Kernel Rootkits through Systematic Hook Discovery. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
RAID 2008
, vol.5230
, pp. 21-38
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
-
44
-
-
24344490175
-
A generic attack on checksumming-based software tamper resistance
-
IEEE Computer Society, Los Alamitos
-
Wurster, G., Oorschot, P.C.v., Somayaji, A.: A Generic Attack on Checksumming-Based Software Tamper Resistance. In: Oakland 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 127-138. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Oakland 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005)
, pp. 127-138
-
-
Wurster, G.1
Oorschot, P.C.V.2
Somayaji, A.3
|