-
2
-
-
78650574143
-
DKSM: Subverting virtualmachine introspection for fun and profit
-
Bahram, S., Jiang, X., Wang, Z., Grace, M., Li, J., Srinivasan, D., Rhee, J., and Xu, D. 2010. DKSM: Subverting virtualmachine introspection for fun and profit. In Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems.
-
(2010)
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
6
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
Caballero, J., Johnson, N. M., McCamant, S., and Song, D. 2010. Binary code extraction and interface identification for security applications. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS'10).
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS'10)
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
DOI 10.1145/1180405.1180445, 1180445, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Cadar, C., Ganesh, V., Pawlowski, P. M., Dill, D. L., and Engler, D. R. 2006. Exe: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). ACM, 322-335. (Pubitemid 47131380)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
8
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
ACM
-
Carbone, M., Cui, W., Lu, L., Lee, W., Peinado, M., and Jiang, X. 2009. Mapping kernel objects to enable systematic integrity checking. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09). ACM, 555-565.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 555-565
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
10
-
-
85084160792
-
Understanding data lifetime via whole-system simulation
-
Chow, J., Pfaff, B., Christopher, K., and Rosenblum, M. 2004. Understanding data lifetime via whole-system simulation. In Proceedings of the 13th USENIX Security Symposium.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Christopher, K.3
Rosenblum, M.4
-
11
-
-
70349283250
-
Tupni: Automatic reverse engineering of input formats
-
ACM
-
Cui, W., Peinado, M., Chen, K., Wang, H. J., and Irun-Briz, L. 2008. Tupni: Automatic reverse engineering of input formats. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). ACM, 391-402.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 391-402
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H.J.4
Irun-Briz, L.5
-
12
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
ACM
-
Dinaburg, A., Royal, P., Sharif, M., and Lee, W. 2008. Ether: Malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). ACM, 51-62.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
13
-
-
74049118754
-
Robust signatures for kernel data structures
-
ACM
-
Dolan-Gavitt, B., Srivastava, A., Traynor, P., and Giffin, J. 2009. Robust signatures for kernel data structures. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09). ACM, 566-577.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 566-577
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
14
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., and Lee, W. 2011a. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Proceedings of IEEE Symposium on Security and Privacy. 297-312.
-
(2011)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 297-312
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
16
-
-
84903607772
-
Dynamic spyware analysis
-
Egele, M., Kruegel, C., Kirda, E., Yin, H., and Song, D. 2007. Dynamic spyware analysis. In Proceedings of the USENIX Annual Technical Conference (Usenix'07).
-
(2007)
Proceedings of the USENIX Annual Technical Conference (Usenix'07)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
17
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff, T. A. 1996. A sense of self for unix processes. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
18
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection
-
Fu, Y. and Lin, Z. 2012. Space traveling across vm: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Fu, Y.1
Lin, Z.2
-
22
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
Gu, Y., Fu, Y., Prakash, A., Lin, Z., and Yin, H. 2012. Os-sommelier: Memory-only operating system fingerprinting in the cloud. In Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC'12).
-
(2012)
Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC'12)
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
23
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
Hay, B. and Nance, K. 2008. Forensics examination of volatile system data using virtual introspection. SIGOPS Operat. Syst. Rev. 42, 74-82.
-
(2008)
SIGOPS Operat. Syst. Rev.
, vol.42
, pp. 74-82
-
-
Hay, B.1
Nance, K.2
-
24
-
-
79953070187
-
Ensuring operating system kernel integrity with oSck
-
Hofmann, O. S., Dunn, A. M., Kim, S., Roy, I., and Witchel, E. 2011. Ensuring operating system kernel integrity with oSck. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'11).
-
(2011)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'11)
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
25
-
-
84885946797
-
Automatically bridging the semantic gap using ac interpreter
-
Inoue, H., Adelstein, F., Donovan, M., and Brueckner, S. 2011. Automatically bridging the semantic gap using ac interpreter. In Proceedings of the Annual Symposium on Information Assurance.
-
(2011)
Proceedings of the Annual Symposium on Information Assurance
-
-
Inoue, H.1
Adelstein, F.2
Donovan, M.3
Brueckner, S.4
-
26
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
-
ACM
-
Jiang, X., Wang, X., and Xu, D. 2007. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM, 128-138.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
29
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
Kolbitsch, C., Holz, T., Kruegel, C., and Kirda, E. 2010. Inspector gadget: Automated extraction of proprietary gadgets from malware binaries. In Proceedings of the IEEE Security and Privacy.
-
(2010)
Proceedings of the IEEE Security and Privacy
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
30
-
-
74049090626
-
Automatic protocol format reverse engineering through contextaware monitored execution
-
Lin, Z., Jiang, X., Xu, D., and Zhang, X. 2008. Automatic protocol format reverse engineering through contextaware monitored execution. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08).
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
33
-
-
84961990257
-
SIGGRAPH: Brute force scanning of kernel data structure instances using graph-based signatures
-
Lin, Z., Rhee, J., Zhang, X., Xu, D., and Jiang, X. 2011. SIGGRAPH: Brute force scanning of kernel data structure instances using graph-based signatures. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
34
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
ACM
-
Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V. J., and Hazelwood, K. 2005. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'05). ACM, 190-200.
-
(2005)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'05)
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
37
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
IEEE
-
Payne, B. D., Carbone, M., Sharif, M. I., and Lee, W. 2008. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 233-247.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.I.3
Lee, W.4
-
39
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
USENIX
-
Petroni, N. L. Jr., Fraser, T., Molina, J., and Arbaugh, W. A. 2004. Copilot - A coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium. USENIX, 179-194.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
45
-
-
80755144012
-
Process out-grafting: An efficient "out-of-vm" approach for fine-grained process execution monitoring
-
ACM
-
Srinivasan, D., Wang, Z., Jiang, X., and Xu, D. 2011. Process out-grafting: an efficient "out-of-vm" approach for fine-grained process execution monitoring. In Proceedings of the 18th ACM conference on Computer and communications security (CCS'11). ACM, 363-374.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
47
-
-
84885912184
-
-
VProbe:a VMI framework. http://communities.vmware.com/community/vmtn/ developer/forums/vprobes.
-
VProbe: A VMI Framework
-
-
-
49
-
-
27544461178
-
Detecting stealth software with strider ghostbuster
-
Wang, Y.-M., Beck, D., Vo, B., Roussev, R., and Verbowski, C. 2005. Detecting stealth software with strider ghostbuster. In Proceedings of the International Conference on Dependable Systems and Networks.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
50
-
-
85180792232
-
Automatic network protocol analysis
-
Wondracek, G., Milani, P., Kruegel, C., and Kirda, E. 2008. Automatic network protocol analysis. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08).
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Wondracek, G.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
-
53
-
-
77955035426
-
Temu: Binary code analysis via whole-system layered annotative execution
-
Yin, H. and Song, D. 2010. Temu: Binary code analysis via whole-system layered annotative execution. Tech. rep. UCB/EECS-2010-3, EECS Department, University of California, Berkeley.
-
(2010)
Tech. Rep. UCB/EECS-2010-3, EECS Department, University of California, Berkeley
-
-
Yin, H.1
Song, D.2
-
54
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Yin, H., Song, D., Manuel, E., Kruegel, C., and Kirda, E. 2007. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS'07).
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS'07)
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
|