-
1
-
-
84914134727
-
-
Online at
-
Draugr. Online at https://code.google.com/p/draugr/.
-
Draugr
-
-
-
2
-
-
84914134726
-
-
Online at
-
FatKit. Online at http://4tphi.net/fatkit/.
-
FatKit
-
-
-
3
-
-
84914134725
-
-
Online at
-
Foriana. Online at http://hysteria.sk/-niekt0/foriana/.
-
Foriana
-
-
-
5
-
-
84914134724
-
-
Online at
-
idetect. Online at http://forensic.seccure.net/.
-
Idetect
-
-
-
9
-
-
84914134721
-
-
Online at
-
Kntlist. Online at http://www.dfrws.org/2005/challenge/kntlist.shtml.
-
Kntlist
-
-
-
10
-
-
84914134720
-
-
Online at
-
lsproc. Online at http://windowsir.blogspot.com/2006/04/lsproc-released.html.
-
Lsproc
-
-
-
11
-
-
84914176978
-
-
Online at
-
Memparser. Online at http://www.dfrws.org/2005/challenge/memparser.shtml.
-
Memparser
-
-
-
12
-
-
84914134719
-
-
Online at
-
PROCENUM. Online at http://forensic.seccure.net/.
-
PROCENUM
-
-
-
13
-
-
84856155043
-
-
Online at
-
Red Hat Crash Utility. Online at http://people.redhat.com/anderson/.
-
Red Hat Crash Utility
-
-
-
15
-
-
84888374488
-
-
Online at
-
The Volatility framework. Online at https://code. google.com/p/volatility/.
-
The Volatility Framework
-
-
-
16
-
-
84914094696
-
-
Online at
-
Volatilitux. Online at https://code.google.com/p/volatilitux/.
-
Volatilitux
-
-
-
18
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In CCS, pages 340-353, 2005.
-
(2005)
CCS
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
19
-
-
84885635827
-
BAR fault tolerance for cooperative services
-
A. S. Aiyer, L. Alvisi, A. Clement, M. Dahlin, J.- P. Martin, and C. Porth. BAR Fault Tolerance for Cooperative Services. In SOSP, pages 45-58, 2005.
-
(2005)
SOSP
, pp. 45-58
-
-
Aiyer, A.S.1
Alvisi, L.2
Clement, A.3
Dahlin, M.4
Martin, J.-P.5
Porth, C.6
-
22
-
-
78650019783
-
Hypersentry: Enabling stealthy incontext measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy incontext measurement of hypervisor integrity. In CCS, pages 38-49, 2010.
-
(2010)
CCS
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
23
-
-
78650574143
-
Dksm: Subverting virtual machine introspection for fun and profit
-
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu. Dksm: Subverting virtual machine introspection for fun and profit. In SRDS, pages 82-91, 2010.
-
(2010)
SRDS
, pp. 82-91
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
24
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC, pages 77-86, 2008.
-
(2008)
ACSAC
, pp. 77-86
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
25
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP, pages 164-177, 2003.
-
(2003)
SOSP
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
26
-
-
84870556673
-
Bringing virtualization to the x86 architecture with the original vmware workstation
-
Nov.
-
E. Bugnion, S. Devine, M. Rosenblum, J. Sugerman, and E. Y. Wang. Bringing virtualization to the x86 architecture with the original vmware workstation. ACM TOCS, 30(4):12:1-12:51, Nov. 2012.
-
(2012)
ACM TOCS
, vol.30
, Issue.4
, pp. 1-51
-
-
Bugnion, E.1
Devine, S.2
Rosenblum, M.3
Sugerman, J.4
Wang, E.Y.5
-
29
-
-
70449672735
-
Exploiting unix filesystem races via algorithmic complexity attacks
-
X. Cai, Y. Gui, and R. Johnson. Exploiting unix filesystem races via algorithmic complexity attacks. In Oakland, pages 27-41, 2009.
-
(2009)
Oakland
, pp. 27-41
-
-
Cai, X.1
Gui, Y.2
Johnson, R.3
-
30
-
-
84867885764
-
Secure and robust monitoring of virtual machines through guest-assisted introspection
-
M. Carbone, M. Conover, B. Montague, and W. Lee. Secure and robust monitoring of virtual machines through guest-assisted introspection. In RAID, pages 22-41, 2012.
-
(2012)
RAID
, pp. 22-41
-
-
Carbone, M.1
Conover, M.2
Montague, B.3
Lee, W.4
-
31
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In CCS, pages 555-565, 2009.
-
(2009)
CCS
, pp. 555-565
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
32
-
-
82655162800
-
Intrusion recovery for database-backed web applications
-
R. Chandra, T. Kim, M. Shah, N. Narula, and N. Zeldovich. Intrusion recovery for database-backed web applications. In SOSP, pages 101-114, 2011.
-
(2011)
SOSP
, pp. 101-114
-
-
Chandra, R.1
Kim, T.2
Shah, M.3
Narula, N.4
Zeldovich, N.5
-
33
-
-
84875649201
-
Iago attacks: Why the system call api is a bad untrusted rpc interface
-
S. Checkoway and H. Shacham. Iago attacks: Why the system call api is a bad untrusted rpc interface. In ASPLOS, 2013.
-
(2013)
ASPLOS
-
-
Checkoway, S.1
Shacham, H.2
-
34
-
-
0035703699
-
When virtual is better than real
-
P. M. Chen and B. D. Noble. When virtual is better than real. In HotOS, pages 133-, 2001.
-
(2001)
HotOS
, pp. 133
-
-
Chen, P.M.1
Noble, B.D.2
-
35
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ASPLOS, pages 2-13, 2008.
-
(2008)
ASPLOS
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
36
-
-
84914134717
-
A new adore root kit
-
March
-
J. Corbet. A new adore root kit. LWN, March 2004. http://lwn.net/Articles/75990/.
-
(2004)
LWN
-
-
Corbet, J.1
-
38
-
-
84893378444
-
Tracking rootkit footprints with a practical memory analysis system
-
W. Cui, M. Peinado, Z. Xu, and E. Chan. Tracking rootkit footprints with a practical memory analysis system. In USENIX Security, pages 42-42, 2012.
-
(2012)
USENIX Security
, pp. 42-42
-
-
Cui, W.1
Peinado, M.2
Xu, Z.3
Chan, E.4
-
39
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In CCS, pages 51-62, 2008.
-
(2008)
CCS
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
40
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Oakland, pages 297-312, 2011.
-
(2011)
Oakland
, pp. 297-312
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
41
-
-
74049118754
-
Robust signatures for kernel data structures
-
B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In CCS, pages 566-577, 2009.
-
(2009)
CCS
, pp. 566-577
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
42
-
-
11844249640
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
-
(2002)
OSDI
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
43
-
-
35348872682
-
The daikon system for dynamic detection of likely invariants
-
Dec.
-
M. D. Ernst, J. H. Perkins, P. J. Guo, S. McCamant, C. Pacheco, M. S. Tschantz, and C. Xiao. The daikon system for dynamic detection of likely invariants. Sci. Comput. Program., 69(1-3):35-45, Dec. 2007.
-
(2007)
Sci. Comput. Program.
, vol.69
, Issue.1-3
, pp. 35-45
-
-
Ernst, M.D.1
Perkins, J.H.2
Guo, P.J.3
McCamant, S.4
Pacheco, C.5
Tschantz, M.S.6
Xiao, C.7
-
44
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
Y. Fu and Z. Lin. Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In Oakland, pages 586-600, 2012.
-
(2012)
Oakland
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
45
-
-
84885395320
-
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
-
Y. Fu and Z. Lin. Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery. In VEE, pages 97-110, 2013.
-
(2013)
VEE
, pp. 97-110
-
-
Fu, Y.1
Lin, Z.2
-
46
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, pages 191-206, 2003.
-
(2003)
NDSS
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
47
-
-
80755188357
-
Process implanting: A new active introspection framework for virtualization
-
Z. Gu, Z. Deng, D. Xu, and X. Jiang. Process implanting: A new active introspection framework for virtualization. In SRDS, pages 147-156, 2011.
-
(2011)
SRDS
, pp. 147-156
-
-
Gu, Z.1
Deng, Z.2
Xu, D.3
Jiang, X.4
-
49
-
-
18844428084
-
Ultra-fast aliasing analysis using cla: A million lines of c code in a second
-
N. Heintze and O. Tardieu. Ultra-fast aliasing analysis using cla: a million lines of c code in a second. In PLDI, pages 254-263, 2001.
-
(2001)
PLDI
, pp. 254-263
-
-
Heintze, N.1
Tardieu, O.2
-
50
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In HASP, 2013.
-
(2013)
HASP
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
51
-
-
79953070187
-
Ensuring operating system kernel integrity with OSck
-
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with OSck. In ASPLOS, pages 279-290, 2011.
-
(2011)
ASPLOS
, pp. 279-290
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
52
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel. Inktag: secure applications on an untrusted operating system. In ASPLOS, pages 265-278, 2013.
-
(2013)
ASPLOS
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
53
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In CCS, pages 128-138, 2007.
-
(2007)
CCS
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
54
-
-
33846554108
-
Geiger: Monitoring the buffer cache in a virtual machine environment
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Geiger: Monitoring the buffer cache in a virtual machine environment. In ASPLOS, ASPLOS XII, pages 14-24, 2006.
-
(2006)
ASPLOS, ASPLOS XII
, pp. 14-24
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
55
-
-
77952336652
-
VMM-based hidden process detection and identification using lycosid
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. VMM-based Hidden Process Detection and Identification Using Lycosid. In VEE, pages 91-100, 2008.
-
(2008)
VEE
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
57
-
-
84867032705
-
Recovering from intrusions in distributed systems with DARE
-
T. Kim, R. Chandra, and N. Zeldovich. Recovering from intrusions in distributed systems with DARE. In APSYS, pages 10:1-10:7, 2012.
-
(2012)
APSYS
, pp. 1-7
-
-
Kim, T.1
Chandra, R.2
Zeldovich, N.3
-
58
-
-
82655169672
-
Intrusion recovery using selective re-execution
-
T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In OSDI, pages 1-9, 2010.
-
(2010)
OSDI
, pp. 1-9
-
-
Kim, T.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
60
-
-
85076279101
-
Ki-mon: A hardware-assisted eventtriggered monitoring platform for mutable kernel object
-
H. Lee, H. Moon, D. Jang, K. Kim, J. Lee, Y. Paek, and B. B. Kang. Ki-mon: a hardware-assisted eventtriggered monitoring platform for mutable kernel object. In USENIX Security, pages 511-526, 2013.
-
(2013)
USENIX Security
, pp. 511-526
-
-
Lee, H.1
Moon, H.2
Jang, D.3
Kim, K.4
Lee, J.5
Paek, Y.6
Kang, B.B.7
-
61
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, pages 9-9, 2004.
-
(2004)
OSDI
, pp. 9-9
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
62
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating return-oriented rootkits with "return-less" kernels. In EuroSys, pages 195-208, 2010.
-
(2010)
EuroSys
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
63
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. A. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In SOSP, pages 178-192, 2003.
-
(2003)
SOSP
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
64
-
-
84961990257
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang. Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures. In NDSS, 2011.
-
(2011)
NDSS
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
65
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
L. Litty, H. A. Lagar-Cavilla, and D. Lie. Hypervisor support for identifying covertly executing binaries. In SS, pages 243-258, 2008.
-
(2008)
SS
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
66
-
-
84862958224
-
Launching return-oriented programming attacks against randomized relocatable executables
-
L. Liu, J. Han, D. Gao, J. Jing, and D. Zha. Launching return-oriented programming attacks against randomized relocatable executables. In TRUSTCOM, pages 37-44, 2011.
-
(2011)
TRUSTCOM
, pp. 37-44
-
-
Liu, L.1
Han, J.2
Gao, D.3
Jing, J.4
Zha, D.5
-
67
-
-
84881138866
-
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
-
Z. Liu, J. Lee, J. Zeng, Y. Wen, Z. Lin, and W. Shi. Cpu transparent protection of os kernel and hypervisor integrity with programmable dram. In ISCA, pages 392-403, 2013.
-
(2013)
ISCA
, pp. 392-403
-
-
Liu, Z.1
Lee, J.2
Zeng, J.3
Wen, Y.4
Lin, Z.5
Shi, W.6
-
68
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. Trustvisor: Efficient tcb reduction and attestation. In Oakland, pages 143-158, 2010.
-
(2010)
Oakland
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
69
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for tcb minimization. In EuroSys, pages 315-328, 2008.
-
(2008)
EuroSys
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
70
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In HASP, 2013.
-
(2013)
HASP
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
71
-
-
84869408742
-
Vigilare: Toward snoop-based kernel integrity monitor
-
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. B. Kang. Vigilare: toward snoop-based kernel integrity monitor. In CCS, pages 28-37, 2012.
-
(2012)
CCS
, pp. 28-37
-
-
Moon, H.1
Lee, H.2
Lee, J.3
Kim, K.4
Paek, Y.5
Kang, B.B.6
-
72
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-free: defeating return-oriented programming through gadget-less binaries. In ACSAC, pages 49-58, 2010.
-
(2010)
ACSAC
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
73
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Oakland, pages 233-247, 2008.
-
(2008)
Oakland
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
74
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In USENIX Security, pages 13-13, 2004.
-
(2004)
USENIX Security
, pp. 13-13
-
-
Petroni, N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
75
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
N. L. Petroni, Jr. and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS, pages 103-115, 2007.
-
(2007)
CCS
, pp. 103-115
-
-
Petroni, N.L.1
Hicks, M.2
-
76
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
July
-
G. J. Popek and R. P. Goldberg. Formal requirements for virtualizable third generation architectures. CACM, 17(7):412-421, July 1974.
-
(1974)
CACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
77
-
-
78249234136
-
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory
-
J. Rhee, R. Riley, D. Xu, and X. Jiang. Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. In RAID, pages 178-197, 2010.
-
(2010)
RAID
, pp. 178-197
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
78
-
-
84904332517
-
Privacysensitive VM retrospection
-
W. Richter, G. Ammons, J. Harkes, A. Goode, N. Bila, E. De Lara, V. Bala, and M. Satyanarayanan. Privacysensitive VM Retrospection. In HotCloud, pages 10-10, 2011.
-
(2011)
HotCloud
, pp. 10-10
-
-
Richter, W.1
Ammons, G.2
Harkes, J.3
Goode, A.4
Bila, N.5
De Lara, E.6
Bala, V.7
Satyanarayanan, M.8
-
79
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing. In RAID, pages 1-20, 2008.
-
(2008)
RAID
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
80
-
-
85080477586
-
HYBRID-BRIDGE: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization
-
A. Saberi, Y. Fu, and Z. Lin. HYBRID-BRIDGE: Efficiently Bridging the Semantic Gap in Virtual Machine Introspection via Decoupled Execution and Training Memoization. In NDSS, 2014.
-
(2014)
NDSS
-
-
Saberi, A.1
Fu, Y.2
Lin, Z.3
-
81
-
-
85135141322
-
Pool allocations as an information source in Windows memory forensics
-
A. Schuster. Pool allocations as an information source in Windows memory forensics. In IMF, pages 104-115, 2006.
-
(2006)
IMF
, pp. 104-115
-
-
Schuster, A.1
-
82
-
-
48949095226
-
The impact of Microsoft Windows pool allocation strategies on memory forensics
-
A. Schuster. The impact of Microsoft Windows pool allocation strategies on memory forensics. Digital Investigation, 5:S58-S64, 2008.
-
(2008)
Digital Investigation
, vol.5
, pp. S58-S64
-
-
Schuster, A.1
-
83
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP, pages 335-350, 2007.
-
(2007)
SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
84
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
M. I. Sharif, W. Lee, W. Cui, and A. Lanzi. Secure in-VM monitoring using hardware virtualization. In CCS, pages 477-487, 2009.
-
(2009)
CCS
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
85
-
-
62949190483
-
An empirical model to predict security vulnerabilities using code complexity metrics
-
Y. Shin and L. Williams. An Empirical Model to Predict Security Vulnerabilities Using Code Complexity Metrics. In ESEM, pages 315-317, 2008.
-
(2008)
ESEM
, pp. 315-317
-
-
Shin, Y.1
Williams, L.2
-
86
-
-
80755144012
-
Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring. In CCS, pages 363-374, 2011.
-
(2011)
CCS
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
87
-
-
85084160014
-
Improving I/O performance using virtual disk introspection
-
V. Tarasov, D. Jain, D. Hildebrand, R. Tewari, G. Kuenning, and E. Zadok. Improving I/O performance using virtual disk introspection. In HotStorage, pages 11-11, 2013.
-
(2013)
HotStorage
, pp. 11-11
-
-
Tarasov, V.1
Jain, D.2
Hildebrand, D.3
Tewari, R.4
Kuenning, G.5
Zadok, E.6
-
88
-
-
78249271707
-
Hypercheck: A hardware-assisted integrity monitor
-
J. Wang, A. Stavrou, and A. Ghosh. Hypercheck: A hardware-assisted integrity monitor. In RAID, pages 158-177, 2010.
-
(2010)
RAID
, pp. 158-177
-
-
Wang, J.1
Stavrou, A.2
Ghosh, A.3
-
89
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In CCS, pages 545-554, 2009.
-
(2009)
CCS
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
90
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In CCS, pages 157-168, 2012.
-
(2012)
CCS
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
91
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. K. Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security Symposium, 2002.
-
(2002)
USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Hartman, G.K.5
-
92
-
-
85092799558
-
Concurrency attacks
-
J. Yang, A. Cui, S. Stolfo, and S. Sethumadhavan. Concurrency attacks. In HotPar, pages 15-15, 2012.
-
(2012)
HotPar
, pp. 15-15
-
-
Yang, J.1
Cui, A.2
Stolfo, S.3
Sethumadhavan, S.4
-
93
-
-
38349008410
-
Virtualmachine-based intrusion detection on file-aware block level storage
-
Y. Zhang, Y. Gu, H. Wang, and D. Wang. Virtualmachine-based intrusion detection on file-aware block level storage. In SBAC-PAD, pages 185-192, 2006.
-
(2006)
SBAC-PAD
, pp. 185-192
-
-
Zhang, Y.1
Gu, Y.2
Wang, H.3
Wang, D.4
-
94
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM side channels and their use to extract private keys. In CCS, pages 305-316, 2012.
-
(2012)
CCS
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|