-
1
-
-
84906749325
-
Attack surface metrics and automated compiletime os kernel tailoring
-
A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg, A. Ruprecht, W. Schröder-Preikschat, D. Lohmann, and R. Kapitza, "Attack surface metrics and automated compiletime os kernel tailoring, " in Proceedings of the 20th Network and Distributed System Security Symposium, 2013.
-
(2013)
Proceedings of the 20th Network and Distributed System Security Symposium
-
-
Kurmus, A.1
Tartler, R.2
Dorneanu, D.3
Heinloth, B.4
Rothberg, V.5
Ruprecht, A.6
Schröder-Preikschat, W.7
Lohmann, D.8
Kapitza, R.9
-
2
-
-
84912136222
-
An application-oriented linux kernel customization for embedded systems
-
C. tai Lee, J. min Lin, Z. wei Hong, and W. tsong Lee, " An application-oriented linux kernel customization for embedded systems," Journal of Information Science and Engineering, 1995.
-
(1995)
Journal of Information Science and Engineering
-
-
Lee, C.T.1
Lin, J.M.2
Hong, Z.W.3
Lee, W.T.4
-
4
-
-
31844440823
-
System-wide compaction and specialization of the linux kernel
-
D. Chanet, B. De Sutter, B. De Bus, L. Van Put, and K. De Bosschere, " System-wide compaction and specialization of the linux kernel," in Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, 2005.
-
Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems
, vol.2005
-
-
Chanet, D.1
De Sutter, B.2
De Bus, B.3
Van Put, L.4
De Bosschere, K.5
-
9
-
-
84912064453
-
-
"RUBiS, " http://rubis.ow2.org/.
-
RUBiS
-
-
-
12
-
-
84912136221
-
-
"Single Process Parasite, " http://www.phrack.org/issues.html? issue=68&id=9#article.
-
Single Process Parasite
-
-
-
14
-
-
84912114594
-
-
"kbeast-v1, " http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-v1/.
-
Kbeast-V1
-
-
-
16
-
-
78249234136
-
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
-
J. Rhee, R. Riley, D. Xu, and X. Jiang, " Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory," in Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection, 2010.
-
(2010)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
17
-
-
70349665533
-
Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring
-
J. Rhee, R. Riley, D. Xu, and X. Jiang, " Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring," in Availability, Reliability and Security, 2009. ARES '09. International Conference on, 2009.
-
(2009)
Availability, Reliability and Security 2009. ARES '09. International Conference on
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
18
-
-
84883401291
-
Drip: A framework for purifying trojaned kernel drivers
-
Z. Gu, W. N. Sumner, Z. Deng, X. Zhang, and D. Xu, " Drip: A framework for purifying trojaned kernel drivers," in Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN), 2013.
-
(2013)
Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN
-
-
Gu, Z.1
Sumner, W.N.2
Deng, Z.3
Zhang, X.4
Xu, D.5
-
19
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, " A secure environment for untrusted helper applications: Confining the wily hacker," in Proceedings of the Sixth USENIX Security Symposium, 1996.
-
(1996)
Proceedings of the Sixth USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
24
-
-
59249084730
-
Paranoid penguin: An introduction to novell apparmor
-
M. Bauer, "Paranoid penguin: An introduction to novell apparmor, " Linux Journal, 2006.
-
(2006)
Linux Journal
-
-
Bauer, M.1
-
25
-
-
80051954621
-
Txbox: Building secure, efficient sandboxes with system transactions
-
S. Jana, D. Porter, and V. Shmatikov, " Txbox: Building secure, efficient sandboxes with system transactions," in Security and Privacy (SP), 2011 IEEE Symposium on, 2011.
-
(2011)
Security and Privacy (SP 2011 IEEE Symposium on
-
-
Jana, S.1
Porter, D.2
Shmatikov, V.3
-
28
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, " Efficient software-based fault isolation," in Proceedings of the 14th ACM Symposium on Operating Systems Principles, 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
30
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, " Native client: A sandbox for portable, untrusted x86 native code, " in Security and Privacy, 2009 30th IEEE Symposium on, 2009.
-
(2009)
Security and Privacy 2009 30th IEEE Symposium on
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
33
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, " SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes," in Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
35
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W. Cui, and P. Ning, "Countering kernel rootkits with lightweight hook protection, " in Proceedings of the 16th ACM conference o n Computer and communications security, 2009.
-
(2009)
Proceedings of the 16th ACM Conference O N Computer and Communications Security
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|