메뉴 건너뛰기




Volumn 7904 LNCS, Issue , 2013, Pages 19-36

Guardian: Hypervisor as security foothold for personal computers

Author keywords

[No Author keywords available]

Indexed keywords

END-USERS; HYPERVISOR; INTEL PROCESSORS; NETWORK PACKETS; TRUSTED COMPUTING BASE;

EID: 84884655952     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38908-5_2     Document Type: Conference Paper
Times cited : (10)

References (44)
  • 2
    • 4043168634 scopus 로고    scopus 로고
    • The IBM PCIXCC: A new cryptographic coprocessor for the IBM eserver
    • Arnold, T.W., Van Doom, L.P.: The IBM PCIXCC: a new cryptographic coprocessor for the IBM eserver. IBM J. Res. Dev. 48(3-4), 475-487 (2004)
    • (2004) IBM J. Res. Dev. , vol.48 , Issue.3-4 , pp. 475-487
    • Arnold, T.W.1    Van Doom, L.P.2
  • 6
    • 77952579228 scopus 로고    scopus 로고
    • Scalable architectural support for trusted software
    • Jacob, M.T., Das, C.R., Bose, P. (eds.) IEEE Computer Society
    • Champagne, D., Lee, R.B.: Scalable architectural support for trusted software. In: Jacob, M.T., Das, C.R., Bose, P. (eds.) HPCA, pp. 1-12. IEEE Computer Society (2010)
    • (2010) HPCA , pp. 1-12
    • Champagne, D.1    Lee, R.B.2
  • 8
    • 84863085822 scopus 로고    scopus 로고
    • Virtualization based password protection against malware in untrusted operating systems
    • Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. Springer, Heidelberg
    • Cheng, Y., Ding, X.: Virtualization based password protection against malware in untrusted operating systems. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 201-218. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7344 , pp. 201-218
    • Cheng, Y.1    Ding, X.2
  • 9
    • 80052985363 scopus 로고    scopus 로고
    • Driverguard: A fine-grained protection on I/O flows
    • Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
    • Cheng, Y., Ding, X., Deng, R.H.: Driverguard: a fine-grained protection on I/O flows. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 227-244. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6879 , pp. 227-244
    • Cheng, Y.1    Ding, X.2    Deng, R.H.3
  • 13
    • 84884642012 scopus 로고    scopus 로고
    • Transparent protection of commodity OS kernels using hardware virtualization
    • Jajodia, S., Zhou, J. (eds.) SecureComm 2010. Springer, Heidelberg
    • Grace, M., Wang, Z., Srinivasan, D., Li, J., Jiang, X., Liang, Z., Liakh, S.: Transparent protection of commodity OS kernels using hardware virtualization. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 162-180. Springer, Heidelberg (2010)
    • (2010) LNICST , vol.50 , pp. 162-180
    • Grace, M.1    Wang, Z.2    Srinivasan, D.3    Li, J.4    Jiang, X.5    Liang, Z.6    Liakh, S.7
  • 14
    • 0003722586 scopus 로고    scopus 로고
    • Hewleet-Packard, Intel, Microsoft, Phoenix, and Toshiba. (Revision 3.0b) October
    • Hewleet-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. (Revision 3.0b) (October 2006)
    • (2006) Advanced Configuration and Power Interface Specification
  • 26
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 32
    • 56549109177 scopus 로고    scopus 로고
    • Tamper-resistant, application-aware blocking of malicious network connections
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Srivastava, A., Giffin, J.: Tamper-resistant, application-aware blocking of malicious network connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 39-58
    • Srivastava, A.1    Giffin, J.2
  • 37
    • 77952371831 scopus 로고    scopus 로고
    • Trusted Computing Group: Version 1.2 rev. 85 February
    • Trusted Computing Group: TPM main specification. Main Specification Version 1.2 rev. 85 (February 2005)
    • (2005) TPM Main Specification. Main Specification
  • 39
    • 78249271707 scopus 로고    scopus 로고
    • HyperCheck: A hardware-assisted integrity monitor
    • Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
    • Wang, J., Stavrou, A., Ghosh, A.: HyperCheck: A hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158-177. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6307 , pp. 158-177
    • Wang, J.1    Stavrou, A.2    Ghosh, A.3
  • 40
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • IEEE Computer Society, Washington, DC
    • Wang, Z., Jiang, X.: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 380-395. IEEE Computer Society, Washington, DC (2010)
    • (2010) Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010 , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 41
    • 56549113546 scopus 로고    scopus 로고
    • Countering persistent kernel rootkits through systematic hook discovery
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Wang, Z., Jiang, X., Cui, W., Wang, X.: Countering persistent kernel rootkits through systematic hook discovery. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 21-38. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 21-38
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Wang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.