-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
November
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
84910673981
-
Hypervisionacross worlds: Real-timekernel protection from thearm trustzone secure world
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. HypervisionAcross Worlds: Real-timeKernel Protection from theARM TrustZone Secure World. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
67650799825
-
Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A.Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports. Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII, 2008.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
7
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
October
-
P. Colp, M. Nanavati, J. Zhu, W. Aiello, G. Coker, T. Deegan, P. Loscocco, and A. Warfield. Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, October 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
9
-
-
70450078948
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
11
-
-
84939168956
-
Nested kernel: An operating system architecture for intra-kernel privilege separation
-
N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve. Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation. In Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, 2015.
-
(2015)
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15
-
-
Dautenhahn, N.1
Kasampalis, T.2
Dietz, W.3
Criswell, J.4
Adve, V.5
-
13
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
14
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In Security and Privacy (SP), 2011 IEEE Symposium on, 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
15
-
-
78651539599
-
XFI: Software guards for system address spaces
-
November
-
U. Erlingsson, S. Valley, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, November 2006.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
-
-
Erlingsson, U.1
Valley, S.2
Abadi, M.3
Vrable, M.4
Budiu, M.5
Necula, G.C.6
-
16
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
Y. Fu and Z. Lin. Space Traveling Across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, 2012.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
-
-
Fu, Y.1
Lin, Z.2
-
24
-
-
54049158076
-
Kvm: The linux virtual machine monitor
-
June
-
A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: The Linux Virtual Machine Monitor. In Proceedings of the 2007 Ottawa Linux Symposium, June 2007.
-
(2007)
Proceedings of the 2007 Ottawa Linux Symposium
-
-
Kivity, A.1
Kamay, Y.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
25
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
October
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal Verification of an OS Kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles, October 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
26
-
-
84914111191
-
SoK: Automated software diversity
-
P. Larsen, A. Homescu, S. Brunthaler, and M. Franz. SoK: Automated Software Diversity. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14, 2014.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14
-
-
Larsen, P.1
Homescu, A.2
Brunthaler, S.3
Franz, M.4
-
27
-
-
77954614533
-
Defeating return-oriented rootkits with "returnless" kernels
-
April
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating Return-Oriented Rootkits with "Returnless" Kernels. In Proceedings of the 5th ACM SIGOPS EuroSys Conference, April 2010.
-
(2010)
Proceedings of the 5th ACM SIGOPS EuroSys Conference
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
30
-
-
84881233720
-
SeL4: From general purpose to a proof of information flow enforcement
-
T. Murray, D. Matichuk, M. Brassil, P. Gammie, T. Bourke, S. Seefried, C. Lewis, X. Gao, and G. Klein. seL4: From General Purpose to a Proof of Information Flow Enforcement. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, 2013.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
-
-
Murray, T.1
Matichuk, D.2
Brassil, M.3
Gammie, P.4
Bourke, T.5
Seefried, S.6
Lewis, C.7
Gao, X.8
Klein, G.9
-
37
-
-
80755144012
-
Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process Out-grafting: An Efficient "out-of-VM" Approach for Fine-grained Process Execution Monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
41
-
-
70449498311
-
-
Trusted Boot project
-
Trusted Boot project. Trusted Boot. http://tboot.sourceforge.net/.
-
Trusted Boot
-
-
-
47
-
-
85077121907
-
-
Wikipedia
-
Wikipedia. DMA Attack. http://en.wikipedia.org/wiki/DMA-attack.
-
DMA Attack
-
-
-
48
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
May
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Orm, S. Okasaka, N. Narula, N. Fullagar, and G. Inc. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Proceedings of the 30th IEEE Symposium on Security and Privacy, May 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Orm, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
Inc, G.10
|