-
4
-
-
84910604128
-
-
CVE-2013-6432. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6432.
-
CVE-2013-6432
-
-
-
9
-
-
84910650899
-
-
ARM Ltd. TrustZone. http://www.arm.com/products/processors/technologies/trustzone.php.
-
TrustZone
-
-
ARM Ltd1
-
11
-
-
84910623833
-
-
WO Patent App
-
A. M. Azab and P. Ning. Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices, Feb. 6 2014. WO Patent App. PCT/US2013/000,074.
-
Methods, Systems, And Computer Readable Medium For Active Monitoring, Memory Protection And Integrity Verification Of Target Devices, Feb. 6 2014
-
-
Azab, A.M.1
Ning, P.2
-
12
-
-
77950820630
-
HIMA: A hypervisor-based integrity measurement agent
-
A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang. HIMA: A hypervisor-based integrity measurement agent. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), pages 193-206, 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC ' 09
, pp. 193-206
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
13
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10), pages 38-49, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
15
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode. Rootkits on smart phones: Attacks, implications and opportunities. In Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications (HotMobile '10), pages 49-54, 2010.
-
(2010)
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications (HotMobile ' 10
, pp. 49-54
-
-
Bickford, J.1
O'hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
16
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
E. Buchanan, E. Roemer, H. Shacham, and S. Savage. When good instructions go bad: generalizing return-oriented programming to RISC. In Proceedings of the 15th ACM conference on Computer and communications security (CCS '08), pages 27-38, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08
, pp. 27-38
-
-
Buchanan, E.1
Roemer, E.2
Shacham, H.3
Savage, S.4
-
17
-
-
85180625962
-
ROPecker: A generic and practical approach for defending against ROP attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng. ROPecker: A generic and practical approach for defending against ROP attacks. In Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS '14), 2014.
-
(2014)
Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS ' 14
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.H.5
-
18
-
-
79959617325
-
SecureME: A hardware-software approach to full system security
-
S. Chhabra, B. Rogers, Y. Solihin, and M. Prvulovic. SecureME: a hardware-software approach to full system security. In Proceedings of the international conference on Supercomputing (ICS '11), pages 108-119, 2011.
-
(2011)
Proceedings of the International Conference on Supercomputing (ICS ' 11
, pp. 108-119
-
-
Chhabra, S.1
Rogers, B.2
Solihin, Y.3
Prvulovic, M.4
-
20
-
-
41149167181
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: a safe execution environment for commodity operating systems. In Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles (SOSP '07), pages 351-366, 2007.
-
(2007)
Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP '07
, pp. 351-366
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
21
-
-
85180792449
-
Mocfi: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nürnberger, and A.-R. Sadeghi. Mocfi: A framework to mitigate control-flow attacks on smartphones. In Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS'12), 2012.
-
(2012)
Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS'12
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
23
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM symposium on Operating systems principles (SOSP '03), pages 193-206, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
33
-
-
70450080729
-
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
-
C. Kil, E. C. Sezer, A. M. Azab, P. Ning, and X. Zhang. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In Proceedings of the 39th International Conference on Dependable Systems and Networks (DSN'09), 2009.
-
(2009)
Proceedings of the 39th International Conference on Dependable Systems and Networks (DSN'09
-
-
Kil, C.1
Sezer, E.C.2
Azab, A.M.3
Ning, P.4
Zhang, X.5
-
34
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: formal verification of an OS kernel. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09), pages 207-220, 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (SOSP '09
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
36
-
-
80755143400
-
L4android: A generic operating system framework for secure smartphones
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter. L4android: A generic operating system framework for secure smartphones. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
37
-
-
80054850540
-
Malicious code injection via /dev/mem
-
A. Lineberry. Malicious code injection via /dev/mem. Black Hat Europe, 2009.
-
(2009)
Black Hat Europe
-
-
Lineberry, A.1
-
39
-
-
84881138866
-
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
-
Z. Liu, J. Lee, J. Zeng, Y. Wen, Z. Lin, and W. Shi. Cpu transparent protection of os kernel and hypervisor integrity with programmable dram. In Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13), 2013.
-
(2013)
Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA ' 13
-
-
Liu, Z.1
Lee, J.2
Zeng, J.3
Wen, Y.4
Lin, Z.5
Shi, W.6
-
40
-
-
77955186544
-
Efficient TCB reduction and attestation
-
May
-
J. McCune, Y. Li, N. Qu, A. Datta, V. Gligor, and A. Perrig. Efficient TCB reduction and attestation. In the 31st IEEE Symposium on Security and Privacy, May 2010.
-
(2010)
The 31st IEEE Symposium on Security and Privacy
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Datta, A.4
Gligor, V.5
Perrig, A.6
-
41
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference on Computer Systems (EuroSys), 2008.
-
(2008)
Proceedings of the ACM European Conference on Computer Systems (EuroSys
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
42
-
-
84869408742
-
Vigilare: Toward snoop-based kernel integrity monitor
-
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. B. Kang. Vigilare: Toward snoop-based kernel integrity monitor. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12), 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12
-
-
Moon, H.1
Lee, H.2
Lee, J.3
Kim, K.4
Paek, Y.5
Kang, B.B.6
-
43
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 29th IEEE Symposium on Security and Privacy, pages 233-247, 2008.
-
(2008)
Proceedings of the 29th IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
45
-
-
70349665533
-
Defeating dynamic data kernel rootkit attacks via VMM-based guest-transparent monitoring
-
J. Rhee, R. Riley, D. Xu, and X. Jiang. Defeating dynamic data kernel rootkit attacks via VMM-based guest-transparent monitoring. In Proceedings of the International Conference on Availability, Reliability and Security (ARES '09), pages 74-81, 2009.
-
(2009)
Proceedings of the International Conference on Availability, Reliability and Security (ARES ' 09
, pp. 74-81
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
46
-
-
84910607206
-
QSEE TrustZone kernel integer over flow vulnerability
-
D. Rosenberg. QSEE TrustZone kernel integer over flow vulnerability. In Black Hat conference, 2014.
-
(2014)
Black Hat Conference
-
-
Rosenberg, D.1
-
50
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles (SOSP '07), pages 335-350, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles (SOSP '07
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
52
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
M. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), pages 477-487, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09
, pp. 477-487
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
57
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity and randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy, 2013.
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|