DKSM: Subverting Virtual Machine Introspection for Fun and Profit
暂无分享,去创建一个
Zhi Wang | Xuxian Jiang | Dongyan Xu | Sina Bahram | Mike Grace | Deepa Srinivasan | Junghwan Rhee | Jinku Li | Michael C. Grace | Dongyan Xu | Xuxian Jiang | J. Rhee | Zhi Wang | Sina Bahram | Jinku Li | D. Srinivasan
[1] Zhi Wang,et al. Countering Persistent Kernel Rootkits through Systematic Hook Discovery , 2008, RAID.
[2] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[3] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[4] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[5] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[6] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[7] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[8] Xuxian Jiang,et al. An Architectural Approach to Preventing Code Injection Attacks , 2010, IEEE Transactions on Dependable and Secure Computing.
[9] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[10] Matt Bishop,et al. Virtual Machine Introspection: Observation or Interference? , 2008, IEEE Security & Privacy.
[11] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[12] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[13] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[14] Paul C. van Oorschot,et al. Hardware-assisted circumvention of self-hashing software tamper resistance , 2005, IEEE Transactions on Dependable and Secure Computing.
[15] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[16] Daniele Sgandurra,et al. Measuring Semantic Integrity for Remote Attestation , 2009, TRUST.
[17] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[18] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[19] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.
[20] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[21] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[22] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[23] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[24] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[25] Abhinav Srivastava,et al. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections , 2008, RAID.
[26] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).