메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Self-signed executables: Restricting replacement of program binaries by malware

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; NETWORK SECURITY;

EID: 84977850543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 4
    • 85091904355 scopus 로고    scopus 로고
    • bsign. Web site
    • bsign. Web site. http://packages.debian.org/stable/ admin/bsign.html.
  • 6
    • 77954397557 scopus 로고    scopus 로고
    • Technical report, Symantec Corp
    • M. Conover. Analysis of the Windows Vista se- curity model. Technical report, Symantec Corp., 2006. http://www.symantec.com/avcenter/reference/ Windows Vista Security Model Analysis.pdf.
    • (2006) Analysis of the Windows Vista se- curity model
    • Conover, M.1
  • 7
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine in- trospection based architecture for intrusion detection
    • Internet Society, February
    • T. Garfinkel and M. Rosenblum. A virtual machine in- trospection based architecture for intrusion detection. In Proc. 2003 Network and Distributed Systems Security Symposium, pages 191-206. Internet Society, February 2003.
    • (2003) Proc. 2003 Network and Distributed Systems Security Symposium , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2
  • 13
    • 32344445800 scopus 로고    scopus 로고
    • Signed kernel modules
    • January
    • G. Kroah-Hartman. Signed kernel modules. Linux Jour- nal, 117:48-53, January 2004.
    • (2004) Linux Jour- nal , vol.117 , pp. 48-53
    • Kroah-Hartman, G.1
  • 18
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of se- mantic integrity violations in kernel dynamic data
    • August
    • N. L. Petroni Jr., T. Fraser, A. Walters, and W. Arbaugh. An architecture for specification-based detection of se- mantic integrity violations in kernel dynamic data. In Proc. 15th USENIX Security Symposium, pages 289-304, August 2006.
    • (2006) Proc. 15th USENIX Security Symposium , pp. 289-304
    • Petroni, N. L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.4
  • 19
    • 55549097262 scopus 로고    scopus 로고
    • Subverting Vista kernel for fun and profit
    • August
    • J. Rutkowska. Subverting Vista kernel for fun and profit. Blackhat Presentation, August 2006. http://blackhat.com/presentations/bh-usa-06/ BH-US-06-Rutkowska.pdf.
    • (2006) Blackhat Presentation
    • Rutkowska, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.