Protecting Commodity Operating Systems through Strong Kernel Isolation
暂无分享,去创建一个
[1] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[2] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[3] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[4] Wolfgang Schröder-Preikschat,et al. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring , 2013, NDSS.
[5] Leyla Bilge,et al. G-Free: defeating return-oriented programming through gadget-less binaries , 2010, ACSAC '10.
[6] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[7] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[8] George Neville-Neil,et al. The Design and Implementation of the FreeBSD Operating System , 2014 .
[9] Henry L. Owen,et al. Towards self-healing systems: re-establishing trust in compromised systems , 2006 .
[10] James R. Larus,et al. Singularity: rethinking the software stack , 2007, OPSR.
[11] Xuxian Jiang,et al. Analyzing and improving Linux kernel memory protection: a model checking approach , 2010, ACSAC '10.
[12] Ahmad-Reza Sadeghi,et al. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection , 2014, USENIX Security Symposium.
[13] Paul A. Karger,et al. An Augmented Capability Architecture to Support Lattice Security and Traceability of Access , 1984, 1984 IEEE Symposium on Security and Privacy.
[14] Javier Martinez Canillas. Kbuild: the Linux kernel build system , 2012 .
[15] Eric Youngdale,et al. Kernel Korner: The ELF Object File Format by Dissection , 1995 .
[16] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[17] David A. Wagner,et al. ROP is Still Dangerous: Breaking Modern Defenses , 2014, USENIX Security Symposium.
[18] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[19] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Clemens Kolbitsch,et al. Kernel-mode exploits primer , 2007 .
[21] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[23] Jack W. Davidson,et al. Safe virtual execution using software dynamic translation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[24] Per Larsen,et al. Security through Diversity: Are We There Yet? , 2014, IEEE Security & Privacy.
[25] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[26] Zhenkai Liang,et al. Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks , 2010, ACSAC '10.
[27] J. Liedtke. On -Kernel Construction , 1995 .
[28] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[29] Luigi Rizzo,et al. netmap: A Novel Framework for Fast Packet I/O , 2012, USENIX ATC.
[30] Patroklos argp. Binding the Daemon : FreeBSD Kernel Stack and Heap Exploitation , 2010 .
[31] Zhi Wang,et al. Defeating return-oriented rootkits with "Return-Less" kernels , 2010, EuroSys '10.
[32] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[33] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[34] Jeff Bonwick,et al. The Slab Allocator: An Object-Caching Kernel Memory Allocator , 1994, USENIX Summer.
[35] Angelos D. Keromytis,et al. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing , 2013, USENIX Security Symposium.
[36] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[37] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[38] Herbert Bos,et al. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard , 2014, USENIX Security Symposium.
[39] Angelos D. Keromytis,et al. kGuard: Lightweight Kernel Protection , 2012, login Usenix Mag..
[40] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[41] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[42] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[43] Angelos D. Keromytis,et al. ASSURE: automatic software self-healing using rescue points , 2009, ASPLOS.
[44] Angelos D. Keromytis,et al. ret2dir: Rethinking Kernel Isolation , 2014, USENIX Security Symposium.
[45] M. Frans Kaashoek,et al. Ksplice: automatic rebootless kernel updates , 2009, EuroSys '09.
[46] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[47] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[48] Angelos D. Keromytis,et al. Adaptive defenses for commodity software through virtual application partitioning , 2012, CCS.
[49] Vitaly Shmatikov,et al. Memento: Learning Secrets from Process Footprints , 2012, 2012 IEEE Symposium on Security and Privacy.
[50] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[51] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.
[52] Angelos D. Keromytis,et al. Software Self-Healing Using Collaborative Application Communities , 2006, NDSS.
[53] Xi Wang,et al. Linux kernel vulnerabilities: state-of-the-art defenses and open problems , 2011, APSys.
[54] Robert Love,et al. Linux Kernel Development (2nd Edition) (Novell Press) , 2005 .
[55] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[56] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[57] Gerald J. Popek,et al. A model for verification of data security in operating systems , 1978, CACM.
[58] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[59] Herbert Bos,et al. MINIX 3: a highly reliable, self-repairing operating system , 2006, OPSR.
[60] Vikram S. Adve,et al. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels , 2014, 2014 IEEE Symposium on Security and Privacy.
[61] Angelos D. Keromytis,et al. ShadowReplica: efficient parallelization of dynamic data flow tracking , 2013, CCS.
[62] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[63] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[64] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[65] Kenneth C. Knowlton,et al. A fast storage allocator , 1965, CACM.
[66] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[67] Alfred V. Aho,et al. The awk programming language , 1988 .
[68] Angelos D. Keromytis,et al. kGuard: Lightweight Kernel Protection against Return-to-User Attacks , 2012, USENIX Security Symposium.
[69] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[70] Christophe Calvès,et al. Faults in linux: ten years later , 2011, ASPLOS XVI.
[71] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[72] Jeffrey S. Chase,et al. Architecture support for single address space operating systems , 1992, ASPLOS V.
[73] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[74] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.