메뉴 건너뛰기




Volumn 2015-January, Issue , 2015, Pages 191-206

Nested kernel: An operating system architecture for intra-kernel privilege separation

Author keywords

Intra kernel isolation; Malicious operating systems; Operating system architecture; Virtual memory

Indexed keywords

ACCESS CONTROL; CODES (SYMBOLS); DYNAMIC LOADS; NETWORK SECURITY; PHYSICAL ADDRESSES;

EID: 84939168956     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2694344.2694386     Document Type: Conference Paper
Times cited : (39)

References (56)
  • 21
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Aug.
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Comput. Secur., 6(3):151-180, Aug. 1998.
    • (1998) J. Comput. Secur. , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 27
    • 70349103030 scopus 로고    scopus 로고
    • No Starch Press, San Francisco, CA, USA
    • J. Kong. Designing BSD Rootkits. No Starch Press, San Francisco, CA, USA, 2007.
    • (2007) Designing BSD Rootkits
    • Kong, J.1
  • 40
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • July
    • J. H. Saltzer. Protection and the control of information sharing in multics. Commun. ACM, 17(7):388-402, July 1974.
    • (1974) Commun. ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 41
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 46
    • 16644400693 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • Feb.
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. ACM Trans. Comput. Syst., 23(1):77-110, Feb. 2005.
    • (2005) ACM Trans. Comput. Syst. , vol.23 , Issue.1 , pp. 77-110
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 50
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Washington, DC, USA IEEE Computer Society
    • Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 380-395, Washington, DC, USA, 2010. IEEE Computer Society.
    • (2010) Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10 , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 52
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • Oakland, California, USA, May IEEE Computer Society
    • C. Warrender, S. Forrest, and B. A. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In 1999 IEEE Symposium on Security and Privacy, SP '99, pages 133-145, Oakland, California, USA, May 1999. IEEE Computer Society.
    • (1999) 1999 IEEE Symposium on Security and Privacy, SP '99 , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.A.3
  • 53
  • 55
    • 84888375834 scopus 로고    scopus 로고
    • SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel
    • S. J. Stolfo, A. Stavrou, and C. V. Wright, editors Springer Berlin Heidelberg, Jan.
    • X. Xiong and P. Liu. SILVER: Fine-grained and transparent protection domain primitives in commodity OS kernel. In S. J. Stolfo, A. Stavrou, and C. V. Wright, editors, Research in Attacks, Intrusions, and Defenses, number 8145 in Lecture Notes in Computer Science, pages 103-122. Springer Berlin Heidelberg, Jan. 2013.
    • (2013) Research in Attacks, Intrusions, and Defenses, Number 8145 in Lecture Notes in Computer Science , pp. 103-122
    • Xiong, X.1    Liu, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.