Data-Centric OS Kernel Malware Characterization
暂无分享,去创建一个
Xuxian Jiang | Dongyan Xu | Ryan Riley | Zhiqiang Lin | Junghwan Rhee | Dongyan Xu | Zhiqiang Lin | Xuxian Jiang | J. Rhee | Ryan D. Riley
[1] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[2] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[3] Xuxian Jiang,et al. An Architectural Approach to Preventing Code Injection Attacks , 2010, IEEE Transactions on Dependable and Secure Computing.
[4] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[5] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[6] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[7] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[8] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[9] Deirdre K. Mulligan,et al. The Magnificence of the Disaster: Reconstructing the Sony Bmg Rootkit Incident , 2008 .
[10] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[11] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[12] Zhi Wang,et al. Defeating return-oriented rootkits with "Return-Less" kernels , 2010, EuroSys '10.
[13] Ryan Riley. A framework for prototyping and testing data-only rootkit attacks , 2013, Comput. Secur..
[14] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[15] Xuxian Jiang,et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures , 2011, NDSS.
[16] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[17] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[18] Dongyan Xu,et al. Polymorphing Software by Randomizing Data Structure Layout , 2009, DIMVA.
[19] Bing Mao,et al. DROP: Detecting Return-Oriented Programming Malicious Code , 2009, ICISS.
[20] Xuxian Jiang,et al. Multi-aspect profiling of kernel rootkit behavior , 2009, EuroSys '09.
[21] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[22] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[23] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[24] Raheem A. Beyah,et al. Toward Revealing Kernel Malware Behavior in Virtual Execution Environments , 2009, RAID.
[25] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[26] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[27] Xuxian Jiang,et al. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory , 2010, RAID.
[28] Claude Castelluccia,et al. Defending embedded systems against control flow attacks , 2009, SecuCode '09.
[29] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[30] Dongyan Xu,et al. LiveDM : Temporal Mapping of Dynamic Kernel Memory for Dynamic Kernel Malware Analysis and Debugging , 2009 .
[31] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[32] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[33] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[34] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[35] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[36] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[37] Jack W. Davidson,et al. Protection of software-based survivability mechanisms , 2001, 2001 International Conference on Dependable Systems and Networks.
[38] Ahmad-Reza Sadeghi,et al. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks , 2009, STC '09.
[39] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[40] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..