메뉴 건너뛰기




Volumn 2, Issue 4, 2014, Pages 380-394

Multi-aspect, robust, and memory exclusive guest os fingerprinting

Author keywords

memory forensics; Operating system fingerprinting; virtual machine introspection

Indexed keywords

CODES (SYMBOLS); LINUX; NETWORK SECURITY; VIRTUAL MACHINE;

EID: 84922329697     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2014.2338305     Document Type: Article
Times cited : (15)

References (41)
  • 1
    • 84922312380 scopus 로고    scopus 로고
    • [Online]. Available
    • Crash. (2014) [Online]. Available: http://mclx.com/projects/ crash/
    • (2014)
  • 3
    • 84922312379 scopus 로고    scopus 로고
    • [Online]. Available
    • Xed: X86 encoder decoder. (2014) [Online]. Available: http:// www. pintool.org/docs/24110/Xed/html/
    • (2014) X86 Encoder Decoder
  • 6
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • E. Bhatkar, D. C. Duvarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a broad range of memory error exploits," in Proc. 12th USENIX Security Symp., 2003, pp.105-120.
    • (2003) Proc. 12th USENIX Security Symp. , pp. 105-120
    • Bhatkar, E.1    Duvarney, D.C.2    Sekar, R.3
  • 13
    • 84876945112 scopus 로고    scopus 로고
    • Space traveling across VM: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection
    • San Francisco, CA, USA, May
    • Y. Fu and Z. Lin, "Space traveling across VM: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection," in Proc. IEEE Symp. Security Privacy, San Francisco, CA, USA, May 2012, pp. 586-600.
    • (2012) Proc. IEEE Symp. Security Privacy , pp. 586-600
    • Fu, Y.1    Lin, Z.2
  • 14
    • 84884996603 scopus 로고    scopus 로고
    • Bridging the semantic gap in virtual machine introspection via online kernel data redirection
    • Y. Fu and Z. Lin, "Bridging the semantic gap in virtual machine introspection via online kernel data redirection," ACM Trans. Inf. Syst. Security, vol. 16, no. 2, pp. 7:1-7:29, 2013.
    • (2013) ACM Trans. Inf. Syst. Security , vol.16 , Issue.2 , pp. 71-729
    • Fu, Y.1    Lin, Z.2
  • 15
    • 84875870787 scopus 로고    scopus 로고
    • Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
    • Houston, TX, USA, Mar.
    • Y. Fu and Z. Lin, "Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery," in Proc. 9th Annu. Int. Conf. Virtual Execution Environ., Houston, TX, USA, Mar. 2013, pp. 97-110.
    • (2013) Proc. 9th Annu. Int. Conf. Virtual Execution Environ. , pp. 97-110
    • Fu, Y.1    Lin, Z.2
  • 17
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • Feb.
    • T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection," in Proc. Netw. Distrib. Syst. Secur. Symp., Feb. 2003.
    • (2003) Proc. Netw. Distrib. Syst. Secur. Symp.
    • Garfinkel, T.1    Rosenblum, M.2
  • 19
    • 84870525044 scopus 로고    scopus 로고
    • Os-sommelier: Memory-only operating system fingerprinting in the cloud
    • San Jose, CA, USA, Oct.
    • Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin, "Os-sommelier: Memory-only operating system fingerprinting in the cloud," in Proc. 3rd ACM Symp. Cloud Comput., San Jose, CA, USA, Oct. 2012, pp. 5:1-5:13.
    • (2012) Proc. 3rd ACM Symp. Cloud Comput. , pp. 51-513
    • Gu, Y.1    Fu, Y.2    Prakash, A.3    Lin, Z.4    Yin, H.5
  • 22
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
    • Alexandria, VA, USA, Nov.
    • X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction," in Proc. 14th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, Nov. 2007, pp. 128-138.
    • (2007) Proc. 14th ACM Conf. Comput. Commun. Security , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 24
    • 0000904908 scopus 로고
    • Fast pattern matching in strings
    • D. E. Knuth, J. H. Morris Jr, and V. R. Pratt, "Fast pattern matching in strings," SIAM J. Comput., vol. 6, no. 2, pp. 323-350, 1977.
    • (1977) SIAM J. Comput. , vol.6 , Issue.2 , pp. 323-350
    • Knuth, D.E.1    Morris, J.H.2    Pratt, V.R.3
  • 28
    • 0030609304 scopus 로고    scopus 로고
    • Automated packet trace analysis of TCP implementations
    • V. Paxson, "Automated packet trace analysis of TCP implementations," in Proc. ACM SIGCOMM, 1997, pp. 167-179.
    • (1997) Proc. ACM SIGCOMM , pp. 167-179
    • Paxson, V.1
  • 30
    • 84870517831 scopus 로고    scopus 로고
    • Operating system fingerprinting for virtual machines
    • N. A. Quynh, "Operating system fingerprinting for virtual machines," in Proc. DEFCON 18, 2010.
    • (2010) Proc. DEFCON , vol.18
    • Quynh, N.A.1
  • 31
    • 85080477586 scopus 로고    scopus 로고
    • Hybrid-bridge: Efficiently bridging the semantic-gap in virtual machine introspection via decoupled execution and training memoization
    • San Diego, CA, USA, Feb.
    • A. Saberi, Y. Fu, and Z. Lin, "Hybrid-bridge: Efficiently bridging the semantic-gap in virtual machine introspection via decoupled execution and training memoization," presented at the 21st Annu. Network and distributed system security symposium, San Diego, CA, USA, Feb. 2014.
    • (2014) Presented at the 21st Annu. Network and Distributed System Security Symposium
    • Saberi, A.1    Fu, Y.2    Lin, Z.3
  • 34
    • 0012109964 scopus 로고    scopus 로고
    • Know your enemy: Passive fingerprinting. Identifying remote hosts without them knowing
    • Ann Arbor, MI, USA
    • C. Smith and P. Grundl, "Know your enemy: Passive fingerprinting. Identifying remote hosts without them knowing," Tech. Rep., Honeynet Project, Ann Arbor, MI, USA, 2002.
    • (2002) Tech. Rep., Honeynet Project
    • Smith, C.1    Grundl, P.2
  • 35
    • 84870560115 scopus 로고    scopus 로고
    • Hotpatching and the rise of third-party patches
    • Las Vegas, NV, USA, Aug.
    • A. Sotirov, "Hotpatching and the rise of third-party patches," in Proc. Black Hat Tech. Security Conf., Las Vegas, NV, USA, Aug. 2006.
    • (2006) Proc. Black Hat Tech. Security Conf.
    • Sotirov, A.1
  • 36
    • 84922312375 scopus 로고    scopus 로고
    • Synscan: Towards complete tcp/ip fingerprinting
    • Vancouver, BC, Canada
    • G. Taleck, "Synscan: Towards complete tcp/ip fingerprinting," presented at the Canada Security West Conf., Vancouver, BC, Canada, 2004.
    • (2004) Presented at the Canada Security West Conf.
    • Taleck, G.1
  • 41
    • 82655179240 scopus 로고    scopus 로고
    • Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
    • F. Zhang, J. Chen, H. Chen, and B. Zang, "Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization," in Proc. 23rd ACM Symp. Operating Syst. Principles, 2011, pp. 203-216.
    • (2011) Proc. 23rd ACM Symp. Operating Syst. Principles , pp. 203-216
    • Zhang, F.1    Chen, J.2    Chen, H.3    Zang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.