-
4
-
-
84875857964
-
-
Vprobe toolkit. https://github.com/vmware/vprobe-toolkit.
-
Vprobe toolkit
-
-
-
8
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
San Diego, CA, February
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS’10), San Diego, CA, February 2010.
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS’10)
-
-
Caballero, J.1
Johnson, N. M.2
McCamant, S.3
Song, D.4
-
9
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
Chicago, IL. October
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In The 16th ACM Conference on Computer and Communications Security (CCS’09), pages 555–565, Chicago, IL. October 2009.
-
(2009)
The 16th ACM Conference on Computer and Communications Security (CCS’09)
, pp. 555-565
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
13
-
-
70349240080
-
Ether: malware analysis via hardware virtualization extensions
-
Alexandria, Virginia. October
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security (CCS’08), pages 51–62, Alexandria, Virginia. October 2008.
-
(2008)
Proceedings of the 15th ACM conference on Computer and communications security (CCS’08)
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
15
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
Oakland, CA. May
-
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (SP’11), pages 297–312, Oakland, CA. May 2011.
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy (SP’11)
, pp. 297-312
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
19
-
-
84876945112
-
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
San Fransisco, CA. May
-
Y. Fu and Z. Lin. Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP’12), pages 586–600, San Fransisco, CA. May 2012.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP’12)
, pp. 586-600
-
-
Fu, Y.1
Lin, Z.2
-
20
-
-
84884996603
-
Bridging the semantic gap in virtual machine introspection via online kernel data redirection
-
7:1–7:29, Sept
-
Y. Fu and Z. Lin. Bridging the semantic gap in virtual machine introspection via online kernel data redirection. ACM Trans. Inf. Syst. Secur., 16(2):7:1–7:29, Sept. 2013.
-
(2013)
ACM Trans. Inf. Syst. Secur
, vol.16
, Issue.2
-
-
Fu, Y.1
Lin, Z.2
-
24
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
San Jose, CA. October
-
Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin. Os-sommelier: Memory-only operating system fingerprinting in the cloud. In Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC’12), San Jose, CA. October 2012.
-
(2012)
Proceedings of the 3rd ACM Symposium on Cloud Computing (SOCC’12)
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
25
-
-
80755188357
-
Process implanting: A new active introspection framework for virtualization
-
Madrid, Spain. October 4-7
-
Z. Gu, Z. Deng, D. Xu, and X. Jiang. Process implanting: A new active introspection framework for virtualization. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), pages 147–156, Madrid, Spain. October 4-7, 2011.
-
(2011)
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011)
, pp. 147-156
-
-
Gu, Z.1
Deng, Z.2
Xu, D.3
Jiang, X.4
-
26
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
April
-
B. Hay and K. Nance. Forensics examination of volatile system data using virtual introspection. SIGOPS Operating System Review, 42:74–82, April 2008.
-
(2008)
SIGOPS Operating System Review
, vol.42
, pp. 74-82
-
-
Hay, B.1
Nance, K.2
-
27
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys’06), pages 29–41. 2006.
-
(2006)
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys’06)
, pp. 29-41
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
28
-
-
84863844486
-
Ensuring operating system kernel integrity with osck
-
Newport Beach, California. March
-
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with osck. In Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems (ASPLOS’11), pages 279–290, Newport Beach, California. March 2011.
-
(2011)
Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems (ASPLOS’11)
, pp. 279-290
-
-
Hofmann, O. S.1
Dunn, A. M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
29
-
-
84885946797
-
Automatically bridging the semantic gap using a c interpreter
-
Albany, NY. June
-
H. Inoue, F. Adelstein, M. Donovan, and S. Brueckner. Automatically bridging the semantic gap using a c interpreter. In Proceedings of the 2011 Annual Symposium on Information Assurance (ASIA’11), Albany, NY. June 2011.
-
(2011)
Proceedings of the 2011 Annual Symposium on Information Assurance (ASIA’11)
-
-
Inoue, H.1
Adelstein, F.2
Donovan, M.3
Brueckner, S.4
-
30
-
-
85180405999
-
A general approach for efficiently accelerating software-based dynamic data flow tracking on commodity hardware
-
San Diego, CA. February
-
K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis. A general approach for efficiently accelerating software-based dynamic data flow tracking on commodity hardware. In Proceedings Network and Distributed Systems Security Symposium (NDSS’12), San Diego, CA. February 2012.
-
(2012)
Proceedings Network and Distributed Systems Security Symposium (NDSS’12)
-
-
Jee, K.1
Portokalidis, G.2
Kemerlis, V. P.3
Ghosh, S.4
August, D. I.5
Keromytis, A. D.6
-
31
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
-
Alexandria, Virginia. October
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pages 128–138, Alexandria, Virginia. October 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07)
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
33
-
-
54049158076
-
kvm: the linux virtual machine monitor
-
A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. kvm: the linux virtual machine monitor. In Proceedings of the Linux Symposium, volume 1, pages 225–230, 2007.
-
(2007)
Proceedings of the Linux Symposium
, vol.1
, pp. 225-230
-
-
Kivity, A.1
Kamay, Y.2
Laor, D.3
Lublin, U.4
Liguori, A.5
-
34
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
Oakland, CA. May
-
C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda. Inspector gadget: Automated extraction of proprietary gadgets from malware binaries. In Proceedings of 2010 IEEE Security and Privacy (SP’10), Oakland, CA. May 2010.
-
(2010)
Proceedings of 2010 IEEE Security and Privacy (SP’10)
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
35
-
-
85180629416
-
-
Massachusetts Institute of Technology (MIT)
-
A. Kotok. Dec debugging tape (ddt). Massachusetts Institute of Technology (MIT), 1964.
-
(1964)
Dec debugging tape (ddt)
-
-
Kotok, A.1
-
36
-
-
46749150482
-
Accurate application-specific sandboxing for win32/intel binaries
-
Manchester, UK
-
W. Li, L.-c. Lam, and T.-c. Chiueh. Accurate application-specific sandboxing for win32/intel binaries. In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS’07), pages 375–382, Manchester, UK. 2007.
-
(2007)
Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS’07)
, pp. 375-382
-
-
Li, W.1
Lam, L.-c.2
Chiueh, T.-c.3
-
38
-
-
33745304805
-
Pin: building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In ACM SIGPLAN Notices, volume 40, pages 190–200, 2005.
-
(2005)
ACM SIGPLAN Notices
, vol.40
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
39
-
-
0002444193
-
Memo” Functions and Machine Learning
-
Apr
-
D. Michie.”Memo” Functions and Machine Learning. Nature, 218(5136):19–22, Apr. 1968.
-
(1968)
Nature
, vol.218
, Issue.5136
, pp. 19-22
-
-
Michie, D.1
-
42
-
-
62749197537
-
Controlling program execution through binary instrumentation
-
Dec
-
H. Pan, K. Asanović, R. Cohn, and C.-K. Luk. Controlling program execution through binary instrumentation. SIGARCH Comput. Archit. News, 33(5):45–50, Dec. 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.5
, pp. 45-50
-
-
Pan, H.1
Asanović, K.2
Cohn, R.3
Luk, C.-K.4
-
44
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA. May
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP’08), pages 233–247, Oakland, CA. May 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP’08)
, pp. 233-247
-
-
Payne, B. D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
45
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
San Diego, CA. August
-
N. L. Petroni, Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - A coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium (Security’04), pages 179–194, San Diego, CA. August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium (Security’04)
, pp. 179-194
-
-
Petroni, N. L.1
Fraser, T.2
Molina, J.3
Arbaugh, W. A.4
-
46
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, B.C., Canada. August
-
N. L. Petroni, Jr., T. Fraser, A. Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the 15th USENIX Security Symposium (Security’06), Vancouver, B.C., Canada. August 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium (Security’06)
-
-
Petroni, N. L.1
Fraser, T.2
Walters, A.3
Arbaugh, W. A.4
-
48
-
-
84870517831
-
Operating system fingerprinting for virtual machines
-
N. A. Quynh. Operating system fingerprinting for virtual machines, 2010. In DEFCON 18.
-
(2010)
DEFCON 18
-
-
Quynh, N. A.1
-
49
-
-
34547666232
-
Biray rewriting of an operating system kernel
-
M. Rajagopalan, S. Perianayagam, H. He, G. Andrews, and S. Debray. Biray rewriting of an operating system kernel. In Proc. Workshop on Binary Instrumentation and Applications, 2006.
-
(2006)
Proc. Workshop on Binary Instrumentation and Applications
-
-
Rajagopalan, M.1
Perianayagam, S.2
He, H.3
Andrews, G.4
Debray, S.5
-
51
-
-
80755144012
-
Process out-grafting: an efficient”out-of-vm” approach for fine-grained process execution monitoring
-
Chicago, Illinois. October
-
D. Srinivasan, Z. Wang, X. Jiang, and D. Xu. Process out-grafting: an efficient”out-of-vm” approach for fine-grained process execution monitoring. In Proceedings of the 18th ACM conference on Computer and communications security (CCS’11), pages 363–374, Chicago, Illinois. October 2011.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security (CCS’11)
, pp. 363-374
-
-
Srinivasan, D.1
Wang, Z.2
Jiang, X.3
Xu, D.4
-
54
-
-
57749197593
-
Flexitaint: A programmable accelerator for dynamic taint propagation
-
Salt Lake City, UT
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. Flexitaint: A programmable accelerator for dynamic taint propagation. In Proceedings of the 4th International Symposium on High Performance Computer Architecture (HPCA’08), Salt Lake City, UT. 2008.
-
(2008)
Proceedings of the 4th International Symposium on High Performance Computer Architecture (HPCA’08)
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
55
-
-
84863351787
-
V2e: Combining hardware virtualization and software emulation for transparent and extensible malware analysis
-
London, UK
-
L.-K. Yan, M. Jayachandra, M. Zhang, and H. Yin. V2e: Combining hardware virtualization and software emulation for transparent and extensible malware analysis. In Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments (VEE’12), pages 227–238, London, UK, 2012.
-
(2012)
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments (VEE’12)
, pp. 227-238
-
-
Yan, L.-K.1
Jayachandra, M.2
Zhang, M.3
Yin, H.4
-
56
-
-
84888988661
-
Obfuscation-resilient binary code reuse through trace-oriented programming
-
Berlin, Germany. November
-
J. Zeng, Y. Fu, K. Miller, Z. Lin, X. Zhang, and D. Xu. Obfuscation-resilient binary code reuse through trace-oriented programming. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS’13), Berlin, Germany. November 2013.
-
(2013)
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS’13)
-
-
Zeng, J.1
Fu, Y.2
Miller, K.3
Lin, Z.4
Zhang, X.5
Xu, D.6
|