메뉴 건너뛰기




Volumn , Issue , 2014, Pages 605-620

SoK: Introspections on trust and the semantic gap

Author keywords

semantic gap; trust; VM Introspection

Indexed keywords

BRIDGES; VIRTUAL MACHINE;

EID: 84914124212     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.45     Document Type: Conference Paper
Times cited : (104)

References (94)
  • 1
    • 84914134727 scopus 로고    scopus 로고
    • Online at
    • Draugr. Online at https://code.google.com/p/draugr/.
    • Draugr
  • 2
    • 84914134726 scopus 로고    scopus 로고
    • Online at
    • FatKit. Online at http://4tphi.net/fatkit/.
    • FatKit
  • 3
    • 84914134725 scopus 로고    scopus 로고
    • Online at
    • Foriana. Online at http://hysteria.sk/-niekt0/foriana/.
    • Foriana
  • 5
    • 84914134724 scopus 로고    scopus 로고
    • Online at
    • idetect. Online at http://forensic.seccure.net/.
    • Idetect
  • 9
    • 84914134721 scopus 로고    scopus 로고
    • Online at
    • Kntlist. Online at http://www.dfrws.org/2005/challenge/kntlist.shtml.
    • Kntlist
  • 10
    • 84914134720 scopus 로고    scopus 로고
    • Online at
    • lsproc. Online at http://windowsir.blogspot.com/2006/04/lsproc-released.html.
    • Lsproc
  • 11
    • 84914176978 scopus 로고    scopus 로고
    • Online at
    • Memparser. Online at http://www.dfrws.org/2005/challenge/memparser.shtml.
    • Memparser
  • 12
    • 84914134719 scopus 로고    scopus 로고
    • Online at
    • PROCENUM. Online at http://forensic.seccure.net/.
    • PROCENUM
  • 13
    • 84856155043 scopus 로고    scopus 로고
    • Online at
    • Red Hat Crash Utility. Online at http://people.redhat.com/anderson/.
    • Red Hat Crash Utility
  • 15
    • 84888374488 scopus 로고    scopus 로고
    • Online at
    • The Volatility framework. Online at https://code. google.com/p/volatility/.
    • The Volatility Framework
  • 16
    • 84914094696 scopus 로고    scopus 로고
    • Online at
    • Volatilitux. Online at https://code.google.com/p/volatilitux/.
    • Volatilitux
  • 21
    • 84958066223 scopus 로고    scopus 로고
    • Innovative technology for cpu based attestation and sealing
    • I. Anati, S. Gueron, S. Johnson, and V. Scarlata. Innovative technology for cpu based attestation and sealing. HASP '13, 2013.
    • (2013) HASP '13
    • Anati, I.1    Gueron, S.2    Johnson, S.3    Scarlata, V.4
  • 22
    • 78650019783 scopus 로고    scopus 로고
    • Hypersentry: Enabling stealthy incontext measurement of hypervisor integrity
    • A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy incontext measurement of hypervisor integrity. In CCS, pages 38-49, 2010.
    • (2010) CCS , pp. 38-49
    • Azab, A.M.1    Ning, P.2    Wang, Z.3    Jiang, X.4    Zhang, X.5    Skalsky, N.C.6
  • 24
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC, pages 77-86, 2008.
    • (2008) ACSAC , pp. 77-86
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 26
    • 84870556673 scopus 로고    scopus 로고
    • Bringing virtualization to the x86 architecture with the original vmware workstation
    • Nov.
    • E. Bugnion, S. Devine, M. Rosenblum, J. Sugerman, and E. Y. Wang. Bringing virtualization to the x86 architecture with the original vmware workstation. ACM TOCS, 30(4):12:1-12:51, Nov. 2012.
    • (2012) ACM TOCS , vol.30 , Issue.4 , pp. 1-51
    • Bugnion, E.1    Devine, S.2    Rosenblum, M.3    Sugerman, J.4    Wang, E.Y.5
  • 28
  • 29
    • 70449672735 scopus 로고    scopus 로고
    • Exploiting unix filesystem races via algorithmic complexity attacks
    • X. Cai, Y. Gui, and R. Johnson. Exploiting unix filesystem races via algorithmic complexity attacks. In Oakland, pages 27-41, 2009.
    • (2009) Oakland , pp. 27-41
    • Cai, X.1    Gui, Y.2    Johnson, R.3
  • 30
    • 84867885764 scopus 로고    scopus 로고
    • Secure and robust monitoring of virtual machines through guest-assisted introspection
    • M. Carbone, M. Conover, B. Montague, and W. Lee. Secure and robust monitoring of virtual machines through guest-assisted introspection. In RAID, pages 22-41, 2012.
    • (2012) RAID , pp. 22-41
    • Carbone, M.1    Conover, M.2    Montague, B.3    Lee, W.4
  • 31
    • 74049158180 scopus 로고    scopus 로고
    • Mapping kernel objects to enable systematic integrity checking
    • M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In CCS, pages 555-565, 2009.
    • (2009) CCS , pp. 555-565
    • Carbone, M.1    Cui, W.2    Lu, L.3    Lee, W.4    Peinado, M.5    Jiang, X.6
  • 32
    • 82655162800 scopus 로고    scopus 로고
    • Intrusion recovery for database-backed web applications
    • R. Chandra, T. Kim, M. Shah, N. Narula, and N. Zeldovich. Intrusion recovery for database-backed web applications. In SOSP, pages 101-114, 2011.
    • (2011) SOSP , pp. 101-114
    • Chandra, R.1    Kim, T.2    Shah, M.3    Narula, N.4    Zeldovich, N.5
  • 33
    • 84875649201 scopus 로고    scopus 로고
    • Iago attacks: Why the system call api is a bad untrusted rpc interface
    • S. Checkoway and H. Shacham. Iago attacks: Why the system call api is a bad untrusted rpc interface. In ASPLOS, 2013.
    • (2013) ASPLOS
    • Checkoway, S.1    Shacham, H.2
  • 34
    • 0035703699 scopus 로고    scopus 로고
    • When virtual is better than real
    • P. M. Chen and B. D. Noble. When virtual is better than real. In HotOS, pages 133-, 2001.
    • (2001) HotOS , pp. 133
    • Chen, P.M.1    Noble, B.D.2
  • 36
    • 84914134717 scopus 로고    scopus 로고
    • A new adore root kit
    • March
    • J. Corbet. A new adore root kit. LWN, March 2004. http://lwn.net/Articles/75990/.
    • (2004) LWN
    • Corbet, J.1
  • 38
    • 84893378444 scopus 로고    scopus 로고
    • Tracking rootkit footprints with a practical memory analysis system
    • W. Cui, M. Peinado, Z. Xu, and E. Chan. Tracking rootkit footprints with a practical memory analysis system. In USENIX Security, pages 42-42, 2012.
    • (2012) USENIX Security , pp. 42-42
    • Cui, W.1    Peinado, M.2    Xu, Z.3    Chan, E.4
  • 39
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In CCS, pages 51-62, 2008.
    • (2008) CCS , pp. 51-62
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 40
    • 80051981742 scopus 로고    scopus 로고
    • Virtuoso: Narrowing the semantic gap in virtual machine introspection
    • B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Oakland, pages 297-312, 2011.
    • (2011) Oakland , pp. 297-312
    • Dolan-Gavitt, B.1    Leek, T.2    Zhivich, M.3    Giffin, J.4    Lee, W.5
  • 41
  • 42
    • 11844249640 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
    • (2002) OSDI
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 44
    • 84876945112 scopus 로고    scopus 로고
    • Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
    • Y. Fu and Z. Lin. Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In Oakland, pages 586-600, 2012.
    • (2012) Oakland , pp. 586-600
    • Fu, Y.1    Lin, Z.2
  • 45
    • 84885395320 scopus 로고    scopus 로고
    • Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
    • Y. Fu and Z. Lin. Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery. In VEE, pages 97-110, 2013.
    • (2013) VEE , pp. 97-110
    • Fu, Y.1    Lin, Z.2
  • 46
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, pages 191-206, 2003.
    • (2003) NDSS , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2
  • 47
    • 80755188357 scopus 로고    scopus 로고
    • Process implanting: A new active introspection framework for virtualization
    • Z. Gu, Z. Deng, D. Xu, and X. Jiang. Process implanting: A new active introspection framework for virtualization. In SRDS, pages 147-156, 2011.
    • (2011) SRDS , pp. 147-156
    • Gu, Z.1    Deng, Z.2    Xu, D.3    Jiang, X.4
  • 49
    • 18844428084 scopus 로고    scopus 로고
    • Ultra-fast aliasing analysis using cla: A million lines of c code in a second
    • N. Heintze and O. Tardieu. Ultra-fast aliasing analysis using cla: a million lines of c code in a second. In PLDI, pages 254-263, 2001.
    • (2001) PLDI , pp. 254-263
    • Heintze, N.1    Tardieu, O.2
  • 50
  • 51
    • 79953070187 scopus 로고    scopus 로고
    • Ensuring operating system kernel integrity with OSck
    • O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with OSck. In ASPLOS, pages 279-290, 2011.
    • (2011) ASPLOS , pp. 279-290
    • Hofmann, O.S.1    Dunn, A.M.2    Kim, S.3    Roy, I.4    Witchel, E.5
  • 52
    • 84875683130 scopus 로고    scopus 로고
    • Inktag: Secure applications on an untrusted operating system
    • O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. Inktag: secure applications on an untrusted operating system. In ASPLOS, pages 265-278, 2013.
    • (2013) ASPLOS , pp. 265-278
    • Hofmann, O.S.1    Kim, S.2    Dunn, A.M.3    Lee, M.Z.4    Witchel, E.5
  • 53
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
    • X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In CCS, pages 128-138, 2007.
    • (2007) CCS , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 55
    • 77952336652 scopus 로고    scopus 로고
    • VMM-based hidden process detection and identification using lycosid
    • S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. VMM-based Hidden Process Detection and Identification Using Lycosid. In VEE, pages 91-100, 2008.
    • (2008) VEE , pp. 91-100
    • Jones, S.T.1    Arpaci-Dusseau, A.C.2    Arpaci-Dusseau, R.H.3
  • 57
    • 84867032705 scopus 로고    scopus 로고
    • Recovering from intrusions in distributed systems with DARE
    • T. Kim, R. Chandra, and N. Zeldovich. Recovering from intrusions in distributed systems with DARE. In APSYS, pages 10:1-10:7, 2012.
    • (2012) APSYS , pp. 1-7
    • Kim, T.1    Chandra, R.2    Zeldovich, N.3
  • 58
    • 82655169672 scopus 로고    scopus 로고
    • Intrusion recovery using selective re-execution
    • T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In OSDI, pages 1-9, 2010.
    • (2010) OSDI , pp. 1-9
    • Kim, T.1    Wang, X.2    Zeldovich, N.3    Kaashoek, M.F.4
  • 60
    • 85076279101 scopus 로고    scopus 로고
    • Ki-mon: A hardware-assisted eventtriggered monitoring platform for mutable kernel object
    • H. Lee, H. Moon, D. Jang, K. Kim, J. Lee, Y. Paek, and B. B. Kang. Ki-mon: a hardware-assisted eventtriggered monitoring platform for mutable kernel object. In USENIX Security, pages 511-526, 2013.
    • (2013) USENIX Security , pp. 511-526
    • Lee, H.1    Moon, H.2    Jang, D.3    Kim, K.4    Lee, J.5    Paek, Y.6    Kang, B.B.7
  • 61
    • 77952379905 scopus 로고    scopus 로고
    • Secure untrusted data repository (SUNDR)
    • J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, pages 9-9, 2004.
    • (2004) OSDI , pp. 9-9
    • Li, J.1    Krohn, M.2    Mazières, D.3    Shasha, D.4
  • 62
    • 77954614533 scopus 로고    scopus 로고
    • Defeating return-oriented rootkits with "return-less" kernels
    • J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating return-oriented rootkits with "return-less" kernels. In EuroSys, pages 195-208, 2010.
    • (2010) EuroSys , pp. 195-208
    • Li, J.1    Wang, Z.2    Jiang, X.3    Grace, M.4    Bahram, S.5
  • 63
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, pages 178-192, 2003.
    • (2003) SOSP , pp. 178-192
    • Lie, D.1    Thekkath, C.A.2    Horowitz, M.3
  • 64
    • 84961990257 scopus 로고    scopus 로고
    • Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
    • Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang. Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures. In NDSS, 2011.
    • (2011) NDSS
    • Lin, Z.1    Rhee, J.2    Zhang, X.3    Xu, D.4    Jiang, X.5
  • 65
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In SS, pages 243-258, 2008.
    • (2008) SS , pp. 243-258
    • Litty, L.1    Lagar-Cavilla, H.A.2    Lie, D.3
  • 66
    • 84862958224 scopus 로고    scopus 로고
    • Launching return-oriented programming attacks against randomized relocatable executables
    • L. Liu, J. Han, D. Gao, J. Jing, and D. Zha. Launching return-oriented programming attacks against randomized relocatable executables. In TRUSTCOM, pages 37-44, 2011.
    • (2011) TRUSTCOM , pp. 37-44
    • Liu, L.1    Han, J.2    Gao, D.3    Jing, J.4    Zha, D.5
  • 67
    • 84881138866 scopus 로고    scopus 로고
    • Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
    • Z. Liu, J. Lee, J. Zeng, Y. Wen, Z. Lin, and W. Shi. Cpu transparent protection of os kernel and hypervisor integrity with programmable dram. In ISCA, pages 392-403, 2013.
    • (2013) ISCA , pp. 392-403
    • Liu, Z.1    Lee, J.2    Zeng, J.3    Wen, Y.4    Lin, Z.5    Shi, W.6
  • 69
    • 77952132371 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for tcb minimization
    • J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for tcb minimization. In EuroSys, pages 315-328, 2008.
    • (2008) EuroSys , pp. 315-328
    • McCune, J.M.1    Parno, B.J.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 71
    • 84869408742 scopus 로고    scopus 로고
    • Vigilare: Toward snoop-based kernel integrity monitor
    • H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. B. Kang. Vigilare: toward snoop-based kernel integrity monitor. In CCS, pages 28-37, 2012.
    • (2012) CCS , pp. 28-37
    • Moon, H.1    Lee, H.2    Lee, J.3    Kim, K.4    Paek, Y.5    Kang, B.B.6
  • 72
    • 78751484536 scopus 로고    scopus 로고
    • G-free: Defeating return-oriented programming through gadget-less binaries
    • K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-free: defeating return-oriented programming through gadget-less binaries. In ACSAC, pages 49-58, 2010.
    • (2010) ACSAC , pp. 49-58
    • Onarlioglu, K.1    Bilge, L.2    Lanzi, A.3    Balzarotti, D.4    Kirda, E.5
  • 73
    • 50249101677 scopus 로고    scopus 로고
    • Lares: An architecture for secure active monitoring using virtualization
    • B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Oakland, pages 233-247, 2008.
    • (2008) Oakland , pp. 233-247
    • Payne, B.D.1    Carbone, M.2    Sharif, M.3    Lee, W.4
  • 74
    • 85084162914 scopus 로고    scopus 로고
    • Copilot - A coprocessor-based kernel runtime integrity monitor
    • N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security, pages 13-13, 2004.
    • (2004) USENIX Security , pp. 13-13
    • Petroni, N.L.1    Fraser, T.2    Molina, J.3    Arbaugh, W.A.4
  • 75
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS, pages 103-115, 2007.
    • (2007) CCS , pp. 103-115
    • Petroni, N.L.1    Hicks, M.2
  • 76
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • July
    • G. J. Popek and R. P. Goldberg. Formal requirements for virtualizable third generation architectures. CACM, 17(7):412-421, July 1974.
    • (1974) CACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 77
    • 78249234136 scopus 로고    scopus 로고
    • Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
    • J. Rhee, R. Riley, D. Xu, and X. Jiang. Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. In RAID, pages 178-197, 2010.
    • (2010) RAID , pp. 178-197
    • Rhee, J.1    Riley, R.2    Xu, D.3    Jiang, X.4
  • 79
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
    • R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, pages 1-20, 2008.
    • (2008) RAID , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 80
    • 85080477586 scopus 로고    scopus 로고
    • HYBRID-BRIDGE: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization
    • A. Saberi, Y. Fu, and Z. Lin. HYBRID-BRIDGE: Efficiently Bridging the Semantic Gap in Virtual Machine Introspection via Decoupled Execution and Training Memoization. In NDSS, 2014.
    • (2014) NDSS
    • Saberi, A.1    Fu, Y.2    Lin, Z.3
  • 81
    • 85135141322 scopus 로고    scopus 로고
    • Pool allocations as an information source in Windows memory forensics
    • A. Schuster. Pool allocations as an information source in Windows memory forensics. In IMF, pages 104-115, 2006.
    • (2006) IMF , pp. 104-115
    • Schuster, A.1
  • 82
    • 48949095226 scopus 로고    scopus 로고
    • The impact of Microsoft Windows pool allocation strategies on memory forensics
    • A. Schuster. The impact of Microsoft Windows pool allocation strategies on memory forensics. Digital Investigation, 5:S58-S64, 2008.
    • (2008) Digital Investigation , vol.5 , pp. S58-S64
    • Schuster, A.1
  • 83
    • 41149103393 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP, pages 335-350, 2007.
    • (2007) SOSP , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 84
    • 74049145643 scopus 로고    scopus 로고
    • Secure in-VM monitoring using hardware virtualization
    • M. I. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-VM monitoring using hardware virtualization. In CCS, pages 477-487, 2009.
    • (2009) CCS , pp. 477-487
    • Sharif, M.I.1    Lee, W.2    Cui, W.3    Lanzi, A.4
  • 85
    • 62949190483 scopus 로고    scopus 로고
    • An empirical model to predict security vulnerabilities using code complexity metrics
    • Y. Shin and L. Williams. An Empirical Model to Predict Security Vulnerabilities Using Code Complexity Metrics. In ESEM, pages 315-317, 2008.
    • (2008) ESEM , pp. 315-317
    • Shin, Y.1    Williams, L.2
  • 86
    • 80755144012 scopus 로고    scopus 로고
    • Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring
    • D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring. In CCS, pages 363-374, 2011.
    • (2011) CCS , pp. 363-374
    • Srinivasan, D.1    Wang, Z.2    Jiang, X.3    Xu, D.4
  • 88
    • 78249271707 scopus 로고    scopus 로고
    • Hypercheck: A hardware-assisted integrity monitor
    • J. Wang, A. Stavrou, and A. Ghosh. Hypercheck: A hardware-assisted integrity monitor. In RAID, pages 158-177, 2010.
    • (2010) RAID , pp. 158-177
    • Wang, J.1    Stavrou, A.2    Ghosh, A.3
  • 89
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In CCS, pages 545-554, 2009.
    • (2009) CCS , pp. 545-554
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 90
    • 84869451043 scopus 로고    scopus 로고
    • Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
    • R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In CCS, pages 157-168, 2012.
    • (2012) CCS , pp. 157-168
    • Wartell, R.1    Mohan, V.2    Hamlen, K.W.3    Lin, Z.4
  • 93
    • 38349008410 scopus 로고    scopus 로고
    • Virtualmachine-based intrusion detection on file-aware block level storage
    • Y. Zhang, Y. Gu, H. Wang, and D. Wang. Virtualmachine-based intrusion detection on file-aware block level storage. In SBAC-PAD, pages 185-192, 2006.
    • (2006) SBAC-PAD , pp. 185-192
    • Zhang, Y.1    Gu, Y.2    Wang, H.3    Wang, D.4
  • 94
    • 84869859962 scopus 로고    scopus 로고
    • Cross-VM side channels and their use to extract private keys
    • Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM side channels and their use to extract private keys. In CCS, pages 305-316, 2012.
    • (2012) CCS , pp. 305-316
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.