Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
暂无分享,去创建一个
[1] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[2] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[3] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[4] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[5] Jeffrey D. Ullman,et al. Introduction to automata theory, languages, and computation, 2nd edition , 2001, SIGA.
[6] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[7] Arvind Seshadri,et al. Attacking , Repairing , and Verifying SecVisor : A Retrospective on the Security of a Hypervisor , 2008 .
[8] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[9] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[10] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[11] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[12] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[13] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[14] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[15] Arati Baliga,et al. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[17] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[18] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.