-
1
-
-
84922312380
-
-
[Online]. Available
-
Crash. (2014) [Online]. Available: http://mclx.com/projects/ crash/
-
(2014)
-
-
-
3
-
-
84922312379
-
-
[Online]. Available
-
Xed: X86 encoder decoder. (2014) [Online]. Available: http:// www. pintool.org/docs/24110/Xed/html/
-
(2014)
X86 Encoder Decoder
-
-
-
5
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, "Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity," in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 38-49.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Secur.
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
6
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
E. Bhatkar, D. C. Duvarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a broad range of memory error exploits," in Proc. 12th USENIX Security Symp., 2003, pp.105-120.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
-
7
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. C. DuVarney, "Efficient techniques for comprehensive protection from memory error exploits," in Proc. 14th Conf. USENIX Security Symp., 2005, p. 17.
-
(2005)
Proc. 14th Conf. USENIX Security Symp.
, pp. 17
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
9
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports, "Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems," in Proc. 13th Int. Conf. Archit. Support Program. Lang. Operating Syst., 2008, pp. 2-13.
-
(2008)
Proc. 13th Int. Conf. Archit. Support Program. Lang. Operating Syst.
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
10
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not (just) virtualization security: A short paper," in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 97-102.
-
(2009)
Proc. ACM Workshop Cloud Comput. Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
11
-
-
85084161026
-
Probing tcp implementations
-
Boston, MA, USA
-
D. E. Comer and J. C. Lin, "Probing tcp implementations," in Proc. USENIX Summer 1994 Tech. Conf., Boston, MA, USA, 1994, pp. 245-255.
-
(1994)
Proc. USENIX Summer 1994 Tech. Conf.
, pp. 245-255
-
-
Comer, D.E.1
Lin, J.C.2
-
12
-
-
84868595716
-
Automated mapping of large binary objects using primitive fragment type classification
-
G. Conti, S. Bratus, B. Sangster, R. Ragsdale, M. Supan, A. Lichtenberg, R. Perez, and A. Shubina, "Automated mapping of large binary objects using primitive fragment type classification," in Proc. DFRWS Annu. Conf., 2010, pp. 3-12.
-
(2010)
Proc. DFRWS Annu. Conf.
, pp. 3-12
-
-
Conti, G.1
Bratus, S.2
Sangster, B.3
Ragsdale, R.4
Supan, M.5
Lichtenberg, A.6
Perez, R.7
Shubina, A.8
-
13
-
-
84876945112
-
Space traveling across VM: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection
-
San Francisco, CA, USA, May
-
Y. Fu and Z. Lin, "Space traveling across VM: Automatically bridging the semantic-gap in virtual machine introspection via online kernel data redirection," in Proc. IEEE Symp. Security Privacy, San Francisco, CA, USA, May 2012, pp. 586-600.
-
(2012)
Proc. IEEE Symp. Security Privacy
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
14
-
-
84884996603
-
Bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
Y. Fu and Z. Lin, "Bridging the semantic gap in virtual machine introspection via online kernel data redirection," ACM Trans. Inf. Syst. Security, vol. 16, no. 2, pp. 7:1-7:29, 2013.
-
(2013)
ACM Trans. Inf. Syst. Security
, vol.16
, Issue.2
, pp. 71-729
-
-
Fu, Y.1
Lin, Z.2
-
15
-
-
84875870787
-
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
-
Houston, TX, USA, Mar.
-
Y. Fu and Z. Lin, "Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery," in Proc. 9th Annu. Int. Conf. Virtual Execution Environ., Houston, TX, USA, Mar. 2013, pp. 97-110.
-
(2013)
Proc. 9th Annu. Int. Conf. Virtual Execution Environ.
, pp. 97-110
-
-
Fu, Y.1
Lin, Z.2
-
19
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
San Jose, CA, USA, Oct.
-
Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin, "Os-sommelier: Memory-only operating system fingerprinting in the cloud," in Proc. 3rd ACM Symp. Cloud Comput., San Jose, CA, USA, Oct. 2012, pp. 5:1-5:13.
-
(2012)
Proc. 3rd ACM Symp. Cloud Comput.
, pp. 51-513
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
20
-
-
84864576758
-
Bin-carver: Automatic recovery of binary executable files
-
Washington, DC, USA, Aug.
-
S. Hand, Z. Lin, G. Gu, and B. Thuraisingham, "Bin-carver: Automatic recovery of binary executable files," in Proc. 12th Annu. Digit. Forensics Res. Conf., Washington, DC, USA, Aug. 2012, pp. 108-117.
-
(2012)
Proc. 12th Annu. Digit. Forensics Res. Conf.
, pp. 108-117
-
-
Hand, S.1
Lin, Z.2
Gu, G.3
Thuraisingham, B.4
-
22
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
-
Alexandria, VA, USA, Nov.
-
X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction," in Proc. 14th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, Nov. 2007, pp. 128-138.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
24
-
-
0000904908
-
Fast pattern matching in strings
-
D. E. Knuth, J. H. Morris Jr, and V. R. Pratt, "Fast pattern matching in strings," SIAM J. Comput., vol. 6, no. 2, pp. 323-350, 1977.
-
(1977)
SIAM J. Comput.
, vol.6
, Issue.2
, pp. 323-350
-
-
Knuth, D.E.1
Morris, J.H.2
Pratt, V.R.3
-
25
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
San Diego, CA, USA
-
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna, "Static disassembly of obfuscated binaries," in Proc. 13th Conf. USENIX Security Symp., San Diego, CA, USA, 2004, pp. 255-270.
-
(2004)
Proc. 13th Conf. USENIX Security Symp.
, pp. 255-270
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
26
-
-
84961990257
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
San Diego, CA, USA, Feb.
-
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang, "Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures," presented at the Proc. 18th Annual Network and Distributed System Security Symp., San Diego, CA, USA, Feb. 2011.
-
(2011)
Presented at the Proc. 18th Annual Network and Distributed System Security Symp.
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
27
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig, "Trustvisor: Efficient tcb reduction and attestation," in Proc. IEEE Symp. Security Privacy, 2010, pp. 143-158.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
28
-
-
0030609304
-
Automated packet trace analysis of TCP implementations
-
V. Paxson, "Automated packet trace analysis of TCP implementations," in Proc. ACM SIGCOMM, 1997, pp. 167-179.
-
(1997)
Proc. ACM SIGCOMM
, pp. 167-179
-
-
Paxson, V.1
-
29
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Dec.
-
B. D. Payne, M. Carbone, and W. Lee, "Secure and flexible monitoring of virtual machines," in Proc. 23rd Annu. Comput. Security Appl. Conf., Dec. 2007, pp. 385-397.
-
(2007)
Proc. 23rd Annu. Comput. Security Appl. Conf.
, pp. 385-397
-
-
Payne, B.D.1
Carbone, M.2
Lee, W.3
-
30
-
-
84870517831
-
Operating system fingerprinting for virtual machines
-
N. A. Quynh, "Operating system fingerprinting for virtual machines," in Proc. DEFCON 18, 2010.
-
(2010)
Proc. DEFCON
, vol.18
-
-
Quynh, N.A.1
-
31
-
-
85080477586
-
Hybrid-bridge: Efficiently bridging the semantic-gap in virtual machine introspection via decoupled execution and training memoization
-
San Diego, CA, USA, Feb.
-
A. Saberi, Y. Fu, and Z. Lin, "Hybrid-bridge: Efficiently bridging the semantic-gap in virtual machine introspection via decoupled execution and training memoization," presented at the 21st Annu. Network and distributed system security symposium, San Diego, CA, USA, Feb. 2014.
-
(2014)
Presented at the 21st Annu. Network and Distributed System Security Symposium
-
-
Saberi, A.1
Fu, Y.2
Lin, Z.3
-
32
-
-
79958700553
-
Disassembly of executable code revisited
-
B. Schwarz, S. Debray, and G. Andrews, "Disassembly of executable code revisited," in Proc. 9th Working Conf. Reverse Eng., 2002, pp. 45-54.
-
(2002)
Proc. 9th Working Conf. Reverse Eng.
, pp. 45-54
-
-
Schwarz, B.1
Debray, S.2
Andrews, G.3
-
33
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses," in Proc. 21st ACM SIGOPS Symp. Oper. Syst. Principles, 2007, pp. 335-350.
-
(2007)
Proc. 21st ACM SIGOPS Symp. Oper. Syst. Principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
34
-
-
0012109964
-
Know your enemy: Passive fingerprinting. Identifying remote hosts without them knowing
-
Ann Arbor, MI, USA
-
C. Smith and P. Grundl, "Know your enemy: Passive fingerprinting. Identifying remote hosts without them knowing," Tech. Rep., Honeynet Project, Ann Arbor, MI, USA, 2002.
-
(2002)
Tech. Rep., Honeynet Project
-
-
Smith, C.1
Grundl, P.2
-
35
-
-
84870560115
-
Hotpatching and the rise of third-party patches
-
Las Vegas, NV, USA, Aug.
-
A. Sotirov, "Hotpatching and the rise of third-party patches," in Proc. Black Hat Tech. Security Conf., Las Vegas, NV, USA, Aug. 2006.
-
(2006)
Proc. Black Hat Tech. Security Conf.
-
-
Sotirov, A.1
-
36
-
-
84922312375
-
Synscan: Towards complete tcp/ip fingerprinting
-
Vancouver, BC, Canada
-
G. Taleck, "Synscan: Towards complete tcp/ip fingerprinting," presented at the Canada Security West Conf., Vancouver, BC, Canada, 2004.
-
(2004)
Presented at the Canada Security West Conf.
-
-
Taleck, G.1
-
39
-
-
27644457078
-
Transparent runtime randomization for security
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer, "Transparent runtime randomization for security," in Proc. 22nd Int. Symp. Reliable Distrib. Syst., 2003, pp. 260-269.
-
(2003)
Proc. 22nd Int. Symp. Reliable Distrib. Syst.
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
40
-
-
70450104367
-
Xprobe2++: Low volume remote network information gathering tool
-
F. Yarochkin, O. Arkin, M. Kydyraliev, S.-Y. Dai, Y. Huang, and S.-Y. Kuo, "Xprobe2++: Low volume remote network information gathering tool," in Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2009, pp. 205-210.
-
(2009)
Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw.
, pp. 205-210
-
-
Yarochkin, F.1
Arkin, O.2
Kydyraliev, M.3
Dai, S.-Y.4
Huang, Y.5
Kuo, S.-Y.6
-
41
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
F. Zhang, J. Chen, H. Chen, and B. Zang, "Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization," in Proc. 23rd ACM Symp. Operating Syst. Principles, 2011, pp. 203-216.
-
(2011)
Proc. 23rd ACM Symp. Operating Syst. Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|