메뉴 건너뛰기




Volumn 50 LNICST, Issue , 2010, Pages 162-180

Transparent protection of commodity OS kernels using hardware virtualization

Author keywords

Harvard architecture; Split memory; Virtualization

Indexed keywords

BINARY TRANSLATION; CODE INJECTION; HARVARD; HARVARD ARCHITECTURE; ROOTKITS; SOFTWARE-BASED; SOURCE CODES; SPLIT MEMORY; TRANSPARENT PROTECTION; VIRTUALIZATIONS;

EID: 84884642012     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16161-2_10     Document Type: Conference Paper
Times cited : (14)

References (44)
  • 1
    • 84885892567 scopus 로고    scopus 로고
    • W∧X
    • W∧X, http://en.wikipedia.org/wiki/W-xor-X
  • 2
    • 84885883676 scopus 로고    scopus 로고
    • Rootkit Numbers Rocketing UP, McAfee Says
    • Rootkit Numbers Rocketing UP, McAfee Says (2006), http://news.cnet.com/ 2100-7349-3-6061878.html
    • (2006)
  • 3
    • 84885884023 scopus 로고    scopus 로고
    • AMD Virtualization (AMD-V) Technology (2009), http://sites.amd.com/us/ business/it-solutions/usage-models/virtualization/Pages/amd-v.aspx
    • (2009)
  • 4
    • 84885884178 scopus 로고    scopus 로고
    • Cooperation Grows in Fight Against Cybercrime
    • Cooperation Grows in Fight Against Cybercrime (2010), http://www.avertlabs.com/research/blog/index.php/category/rootkits-and-stealth- malware/
    • (2010)
  • 7
    • 84885888005 scopus 로고    scopus 로고
    • Apache Http Server Project, http://httpd.apache.org/
  • 18
    • 84885885662 scopus 로고    scopus 로고
    • Klein, T.: ScoopyNG (2010), http://www.trapkit.de/research/vmm/scoopyng/
    • (2010) ScoopyNG
    • Klein, T.1
  • 31
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) LNCS Springer, Heidelberg
    • Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
    • (2008) RAID 2008 , vol.5230 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 33
    • 77955176901 scopus 로고    scopus 로고
    • Rutkowska, J.: Red Pill (2004), http://invisiblethings.org/papers/ redpill.html
    • (2004) Red Pill
    • Rutkowska, J.1
  • 36
    • 41149103393 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel code Integrity for Commodity OSes. In: SOSP 2007: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles, pp. 335-350. ACM, New York (2007) (Pubitemid 351429386)
    • (2007) Operating Systems Review (ACM) , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 39
    • 77952405499 scopus 로고    scopus 로고
    • Shadow walker.: Raising the bar for rootkit detection
    • Sparks, S., Butler, J.: Shadow Walker.: Raising the Bar for Rootkit Detection. In: Black Hat Japan (2005)
    • (2005) Black Hat Japan
    • Sparks, S.1    Butler, J.2
  • 41
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • IEEE Computer Society, Los Alamitos
    • Wang, Z., Jiang, X.: HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In: Oakland 2010: IEEE Symposium on Security and Privacy (S&P 2010), pp. 380-398. IEEE Computer Society, Los Alamitos (2010)
    • (2010) Oakland 2010: Ieee Symposium on Security and Privacy (S&P 2010) , pp. 380-398
    • Wang, Z.1    Jiang, X.2
  • 43
    • 56549113546 scopus 로고    scopus 로고
    • Countering persistent kernel rootkits through systematic hook discovery
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) LNCS Springer, Heidelberg
    • Wang, Z., Jiang, X., Cui, W., Wang, X.: Countering Persistent Kernel Rootkits through Systematic Hook Discovery. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 21-38. Springer, Heidelberg (2008)
    • (2008) RAID 2008 , vol.5230 , pp. 21-38
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Wang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.