Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
暂无分享,去创建一个
[1] Claudia Eckert,et al. Nitro: Hardware-Based System Call Tracing for Virtual Machines , 2011, IWSEC.
[2] Ramesh Karri,et al. Are hardware performance counters a cost effective way for integrity checking of programs , 2011, STC '11.
[3] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[4] Godmar Back,et al. Perfctr-Xen: a framework for performance counter virtualization , 2011, VEE '11.
[5] Willy Zwaenepoel,et al. Performance profiling of virtual machines , 2011, VEE '11.
[6] Claudia Eckert,et al. Exploiting the x86 Architecture to Derive Virtual Machine State Information , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[7] Heng Yin. TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution , 2010 .
[8] Samuel T. King,et al. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.
[9] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[10] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[11] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[12] Sanjay Bhansali,et al. Framework for instruction-level tracing and analysis of program executions , 2006, VEE '06.
[13] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[15] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[16] Brinkley Sprunt,et al. The Basics of Performance-Monitoring Hardware , 2002, IEEE Micro.