-
1
-
-
85094843538
-
Digsig: Run-time authentication of binaries at kernel level
-
A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi, and V. Roy. Digsig: Run-time authentication of binaries at kernel level. In Proc. LISA '04: Eighteenth Systems Ad- ministration Conference, pages 59-66, 2004.
-
(2004)
Proc. LISA '04: Eighteenth Systems Ad- ministration Conference
, pp. 59-66
-
-
Apvrille, A.1
Gordon, D.2
Hallyn, S.3
Pourzandi, M.4
Roy, V.5
-
4
-
-
85091904355
-
-
bsign. Web site
-
bsign. Web site. http://packages.debian.org/stable/ admin/bsign.html.
-
-
-
-
6
-
-
77954397557
-
-
Technical report, Symantec Corp
-
M. Conover. Analysis of the Windows Vista se- curity model. Technical report, Symantec Corp., 2006. http://www.symantec.com/avcenter/reference/ Windows Vista Security Model Analysis.pdf.
-
(2006)
Analysis of the Windows Vista se- curity model
-
-
Conover, M.1
-
7
-
-
85080362568
-
A virtual machine in- trospection based architecture for intrusion detection
-
Internet Society, February
-
T. Garfinkel and M. Rosenblum. A virtual machine in- trospection based architecture for intrusion detection. In Proc. 2003 Network and Distributed Systems Security Symposium, pages 191-206. Internet Society, February 2003.
-
(2003)
Proc. 2003 Network and Distributed Systems Security Symposium
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
10
-
-
84885639914
-
De- tecting past and present intrusions through vulnerability- specific predicates
-
ACM Press
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen. De- tecting past and present intrusions through vulnerability- specific predicates. In SOSP '05: Proceedings of the twen- tieth ACM symposium on Operating systems principles, pages 91-104. ACM Press, 2005.
-
(2005)
SOSP '05: Proceedings of the twen- tieth ACM symposium on Operating systems principles
, pp. 91-104
-
-
Joshi, A.1
King, S. T.2
Dunlap, G. W.3
Chen, P. M.4
-
13
-
-
32344445800
-
Signed kernel modules
-
January
-
G. Kroah-Hartman. Signed kernel modules. Linux Jour- nal, 117:48-53, January 2004.
-
(2004)
Linux Jour- nal
, vol.117
, pp. 48-53
-
-
Kroah-Hartman, G.1
-
14
-
-
21644451617
-
Detecting kernel-level rootkits through binary analysis
-
Washington, DC, USA, IEEE Computer Society
-
C. Kruegel, W. Robertson, and G. Vigna. Detecting kernel-level rootkits through binary analysis. In Proc. 20th Annual Computer Security Applications Conference (ACSAC'04), pages 91-100, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proc. 20th Annual Computer Security Applications Conference (ACSAC'04)
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
16
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
August
-
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Good- son, and G. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior. In Proc. 12th USENIX Security Symposium, pages 137-151, August 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 137-151
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Good- son, G.5
Ganger, G.6
-
17
-
-
85084162914
-
Copilot - a coprocessor-based kernel runtime in- tegrity monitor
-
August
-
N. L. Petroni Jr., T. Fraser, J. Molina, and W. A. Ar- baugh. Copilot - a coprocessor-based kernel runtime in- tegrity monitor. In Proc. 13th USENIX Security Sympo- sium, pages 179-194, August 2004.
-
(2004)
Proc. 13th USENIX Security Sympo- sium
, pp. 179-194
-
-
Petroni, N. L.1
Fraser, T.2
Molina, J.3
Ar- baugh, W. A.4
-
18
-
-
84991799247
-
An architecture for specification-based detection of se- mantic integrity violations in kernel dynamic data
-
August
-
N. L. Petroni Jr., T. Fraser, A. Walters, and W. Arbaugh. An architecture for specification-based detection of se- mantic integrity violations in kernel dynamic data. In Proc. 15th USENIX Security Symposium, pages 289-304, August 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
, pp. 289-304
-
-
Petroni, N. L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.4
-
19
-
-
55549097262
-
Subverting Vista kernel for fun and profit
-
August
-
J. Rutkowska. Subverting Vista kernel for fun and profit. Blackhat Presentation, August 2006. http://blackhat.com/presentations/bh-usa-06/ BH-US-06-Rutkowska.pdf.
-
(2006)
Blackhat Presentation
-
-
Rutkowska, J.1
-
21
-
-
27544461178
-
Detecting stealth software with strider ghost- buster
-
June
-
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Ver- bowski. Detecting stealth software with strider ghost- buster. In Proc. International Conference on Depend- able Systems and Networks (DSN-DCCS), pages 368-377, June 2005.
-
(2005)
Proc. International Conference on Depend- able Systems and Networks (DSN-DCCS)
, pp. 368-377
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Ver- bowski, C.5
|