-
1
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: NDSS (2003)
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
2
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-thebox" semantic view reconstruction
-
Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based "out-of-thebox" semantic view reconstruction. In: ACMConference on Computer and Communications Security, pp. 128-138 (2007)
-
(2007)
ACMConference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
3
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
Fu, Y., Lin, Z.: Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In: IEEE Symposium on Security and Privacy, pp. 586-600 (2012)
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
4
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J.T., Lee, W.: Virtuoso: Narrowing the semantic gap in virtual machine introspection. In: IEEE Symposium on Security and Privacy, pp. 297-312 (2011)
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 297-312
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.T.4
Lee, W.5
-
5
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
Dinaburg, A., Royal, P., Sharif, M.I., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: ACM Conference on Computer and Communications Security, pp. 51-62 (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.I.3
Lee, W.4
-
6
-
-
84893231124
-
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
-
Deng, Z., Zhang, X., Xu, D.: Spider: stealthy binary program instrumentation and debugging via hardware virtualization. In: ACSAC, pp. 289-298 (2013)
-
(2013)
ACSAC
, pp. 289-298
-
-
Deng, Z.1
Zhang, X.2
Xu, D.3
-
7
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
USENIX Association
-
Yan, L.K., Yin, H.: Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 29. USENIX Association (2012)
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012
, pp. 29
-
-
Yan, L.K.1
Yin, H.2
-
8
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: EuroSys, pp. 315-328 (2008)
-
(2008)
EuroSys
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
9
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V.D., Perrig, A.: Trustvisor: Efficient tcb reduction and attestation. In: IEEE Symposium on Security and Privacy, pp. 143-158 (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
10
-
-
84885595267
-
Cloud terminal: Secure access to sensitive applications from untrusted systems
-
USENIX Association
-
Martignoni, L., Poosankam, P., Zaharia, M., Han, J., McCamant, S., Song, D., Paxson, V., Perrig, A., Shenker, S., Stoica, I.: Cloud terminal: secure access to sensitive applications from untrusted systems. In: Proceedings of the 2012 USENIX Conference on Annual Technical Conference, p. 14. USENIX Association (2012)
-
(2012)
Proceedings of the 2012 USENIX Conference on Annual Technical Conference
, pp. 14
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Paxson, V.7
Perrig, A.8
Shenker, S.9
Stoica, I.10
-
11
-
-
84883443579
-
Spectre: A dependable introspection framework via system management mode
-
Zhang, F., Leach, K., Sun, K., Stavrou, A.: Spectre: A dependable introspection framework via system management mode. In: DSN, pp. 1-12 (2013)
-
(2013)
DSN
, pp. 1-12
-
-
Zhang, F.1
Leach, K.2
Sun, K.3
Stavrou, A.4
-
12
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: ACM Conference on Computer and Communications Security, pp. 38-49 (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
13
-
-
78249271707
-
Hypercheck: A hardware-assisted integrity monitor
-
In: Jha, S., Sommer, R., Kreibich, C. (eds.) Springer, Heidelberg
-
Wang, J., Stavrou, A., Ghosh, A.: Hypercheck: A hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158-177. Springer, Heidelberg (2010)
-
(2010)
RAID 2010. LNCS
, vol.6307
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
14
-
-
80755169488
-
Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
Azab, A.M., Ning, P., Zhang, X.: Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In: ACM Conference on Computer and Communications Security, pp. 375-388 (2011)
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Azab, A.M.1
Ning, P.2
Zhang, X.3
-
15
-
-
84906509985
-
-
ARM: TrustZone Introduction
-
ARM: TrustZone Introduction, http://www.arm.com/products/processors/ technologies/trustzone/index.php
-
-
-
-
16
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
Alves, T., Felton, D.: Trustzone: Integrated hardware and software security. ARM White Paper 3(4) (2004)
-
(2004)
ARM White Paper
, vol.3
, Issue.4
-
-
Alves, T.1
Felton, D.2
-
17
-
-
84906490767
-
-
ARM: Cortex-A8 Technical Reference Manual
-
ARM: Cortex-A8 Technical Reference Manual, http://infocenter.arm.com/ help/topic/com.arm.doc.ddi0344k/DDI0344K cortex a8 r3p2 trm.pdf
-
-
-
-
18
-
-
84906518789
-
-
ARM: Cortex-A9 Technical Reference Manual
-
ARM: Cortex-A9 Technical Reference Manual, http://infocenter.arm.com/ help/topic/com.arm.doc.ddi0388f/DDI0388F cortex a9 r2p2 trm.pdf
-
-
-
-
19
-
-
84906500239
-
-
ARM: ARM Cortex-A15 MPCore Processor Technical Reference Manual
-
ARM: ARM Cortex-A15 MPCore Processor Technical Reference Manual, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0438i/index.html
-
-
-
-
20
-
-
84906509986
-
-
ARM: Interrupt Behavior of Cortex-M1
-
ARM: Interrupt Behavior of Cortex-M1, http://infocenter.arm.com/help/ index.jsp?topic=/com.arm.doc.dai0211a/index.html
-
-
-
-
21
-
-
84906500240
-
-
ARM: Cortex-M4 Devices Generic User Guide
-
ARM: Cortex-M4 Devices Generic User Guide, http://infocenter.arm.com/ help/index.jsp?topic=/com.arm.doc.dui0553a/Cihfaaha.html
-
-
-
-
22
-
-
84906490765
-
-
Freescale: Imx53qsb: i.mx53 quick start board
-
Freescale: Imx53qsb: i.mx53 quick start board, http://www.freescale.com/ webapp/sps/site/prod summary.jsp?code=IMX53QSB&tid= vanIMXQUICKSTART
-
-
-
-
23
-
-
84906490766
-
-
Adeneo Embedded: Reference BSPs for Freescale i.MX53 Quick Start Board
-
Adeneo Embedded: Reference BSPs for Freescale i.MX53 Quick Start Board, http://www.adeneo-embedded.com/en/Products/Board-Support-Packages/Freescale-i. MX53-QSB
-
-
-
-
24
-
-
84906509984
-
-
Paul Bakker: PolarSSL
-
Paul Bakker: PolarSSL, https://polarssl.org/
-
-
-
-
25
-
-
84906500238
-
-
Michael Coppola: Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM
-
Michael Coppola: Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM, http://poppopret.org/2013/01/07/suterusu-rootkit-inlinekernel-function- hooking-on-x86-and-arm/
-
-
-
-
26
-
-
84917741115
-
Procedures and tools for acquisition and analysis of volatile memory on android smartphones
-
SRI Security Research Institute, Edith Cowan University, Perth, Western Australia
-
Heriyanto, A.P.: Procedures and tools for acquisition and analysis of volatile memory on android smartphones. In: Proceedings of The 11th Australian Digital Forensics Conference. SRI Security Research Institute, Edith Cowan University, Perth, Western Australia (2013)
-
(2013)
Proceedings of the 11th Australian Digital Forensics Conference
-
-
Heriyanto, A.P.1
-
27
-
-
84857917909
-
Acquisition and analysis of volatile memory from android devices
-
Sylve, J., Case, A.,Marziale, L., Richard III, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Investigation 8(3-4), 175-184 (2012)
-
(2012)
Digital Investigation
, vol.8
, Issue.3-4
, pp. 175-184
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.G.4
-
28
-
-
84906500236
-
-
Google: Using ddms for debugging
-
Google: Using ddms for debugging, http://developer.android.com/tools/ debugging/ddms.html
-
-
-
-
29
-
-
84906509983
-
-
Stevenson, A.: Boot into Recovery Mode for Rooted and Un-rooted Android devices
-
Stevenson, A.: Boot into Recovery Mode for Rooted and Un-rooted Android devices, http://androidflagship.com/605-enter-recovery-mode-rooted-un-rooted- android
-
-
-
-
32
-
-
3042731401
-
A hardware-based memory acquisition procedure for digital investigations
-
Carrier, B.D., Grand, J.: A hardware-based memory acquisition procedure for digital investigations. Digital Investigation 1(1), 50-60 (2004)
-
(2004)
Digital Investigation
, vol.1
, Issue.1
, pp. 50-60
-
-
Carrier, B.D.1
Grand, J.2
-
33
-
-
33644922345
-
Forensic imaging of embedded systems using jtag (boundary-scan)
-
March
-
Breeuwsma, I.M.F.: Forensic Imaging of Embedded Systems Using JTAG (Boundary-scan). Digit. Investig. 3(1) (March 2006)
-
(2006)
Digit. Investig
, vol.3
, Issue.1
-
-
Breeuwsma, I.M.F.1
-
35
-
-
51049087072
-
Internal forensic acquisition for mobile equipments
-
Me, G., Rossi, M.: Internal forensic acquisition for mobile equipments. In: IPDPS, pp. 1-7 (2008)
-
(2008)
IPDPS
, pp. 1-7
-
-
Me, G.1
Rossi, M.2
|