메뉴 건너뛰기




Volumn 16, Issue 2, 2013, Pages

DriverGuard: Virtualization-based fine-grained protection on i/o flows

Author keywords

Hypervisor; I O data protection; Trusted path; Untrusted OS; Virtualization

Indexed keywords

DATA PROTECTION; FINGERPRINT READER; FINGERPRINT-BASED BIOMETRICS; HYPERVISOR; SECURITY FUNCTIONS; TRUSTED PATH; VIRTUALIZATION TECHNIQUES; VIRTUALIZATIONS;

EID: 84885012508     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2505123     Document Type: Article
Times cited : (16)

References (54)
  • 4
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • P. Syverson and S. Jha Eds. ACM
    • Buchanan, E., Roemer, R., Shacham, H., and Savage, S. 2008. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of CCS'08. P. Syverson and S. Jha Eds., ACM, 27-38.
    • (2008) Proceedings of CCS'08 , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 9
    • 0036041421 scopus 로고    scopus 로고
    • An empirical study of operating systems errors
    • DOI 10.1145/502059.502042
    • Chou, A., Yang, J., Chelf, B., Hallem, S., and Engler, D. 2001. An empirical study of operating systems errors. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01). ACM, New York, 73-88. (Pubitemid 33612606)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 73-88
    • Chou, A.1    Yang, J.2    Chelf, B.3    Hallem, S.4    Engler, D.5
  • 11
    • 84885923310 scopus 로고    scopus 로고
    • CVE-2008-0923. 2008http://cve.mitre.org/cgi-bin/cvename.cgi-?name=cve- 2008-0923.
    • (2008)
  • 14
    • 84884651478 scopus 로고    scopus 로고
    • Accessing PCI express configuration registers using intel chipsets
    • Fleming, S. 2008. Accessing PCI express configuration registers using intel chipsets. Tech. rep., Intel Corporation, http://www.intel.com/content/www/ us/en/intelligent-systems/chipsets-pcie-configreg-paper.html.
    • (2008) Tech. Rep., Intel Corporation
    • Fleming, S.1
  • 18
    • 34547321335 scopus 로고    scopus 로고
    • Formal specification and verification of data separation in a separation kernel for an embedded system
    • DOI 10.1145/1180405.1180448, 1180448, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Heitmeyer, C. L., Archer, M., Leonard, E. I., and McLean, J. 2006. Formal specification and verification of data separation in a separation kernel for an embedded system. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). ACM, New York, 346-355. (Pubitemid 47131382)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 346-355
    • Heitmeyer, C.L.1    Archer, M.2    Leonard, E.I.3    McLean, J.4
  • 21
    • 33751032041 scopus 로고    scopus 로고
    • SubVirt: Implementing malware with virtual machines
    • DOI 10.1109/SP.2006.38, 1624022, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • King, S. T., Chen, P. M., Wang, Y.-M., Verbowski, C., Wang, H. J., and Lorch, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, 314-327. (Pubitemid 44753733)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 314-327
    • King, S.T.1    Chen, P.M.2    Wang, Y.-M.3    Verbowski, C.4    Wang, H.J.5    Lorch, J.R.6
  • 25
    • 80054850540 scopus 로고    scopus 로고
    • Malicious code injection via/dev/mem
    • Lineberry, A. 2009. Malicious code injection via/dev/mem. In Black Hat.
    • (2009) Black Hat
    • Lineberry, A.1
  • 31
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • Newsome, J. and Song, D. 2005. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium.
    • (2005) Proceedings of the Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 37
    • 41149103393 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • DOI 10.1145/1294261.1294294, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • Seshadri, A., Luk, M., Qu, N., and Perrig, A. 2007. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07). ACM, New York, 335-350. (Pubitemid 351429386)
    • (2007) Operating Systems Review (ACM) , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 38
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • S. De Capitani di Vimercati and P. Syverson Eds. ACM
    • Shacham, H. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of CCS'07. S. De Capitani di Vimercati and P. Syverson Eds., ACM, 552-61.
    • (2007) Proceedings of CCS'07 , pp. 552-561
    • Shacham, H.1
  • 39
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Shi, E., Perrig, A., and Doorn, L. V. 2005. BIND: A fine-grained attestation service for secure distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy. 154-168. (Pubitemid 41543653)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doom, L.3
  • 43
    • 21644451622 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Swift, M. M., Bershad, B. N., and Levy, H. M. 2003. Improving the reliability of commodity operating systems. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03). ACM, New York, 207-222. (Pubitemid 40929698)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 207-222
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 44
    • 84885945169 scopus 로고    scopus 로고
    • The Blue Pill. http://blackhat.com/presentations/bh-usa-06/BH-US-06- Rutkowska.pdf.
    • The Blue Pill
  • 47
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • IEEE Computer Society, Los Alamitos, CA
    • Wang, Z. and Jiang, X. 2010. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). IEEE Computer Society, Los Alamitos, CA, 380-395.
    • (2010) Proceedings of the IEEE Symposium on Security and Privacy (SP'10) , pp. 380-395
    • Wang, Z.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.