DRIP: A framework for purifying trojaned kernel drivers
暂无分享,去创建一个
Zhongshu Gu | Xiangyu Zhang | Dongyan Xu | William N. Sumner | Zhui Deng | X. Zhang | Dongyan Xu | Zhongshu Gu | Zhui Deng | Nick Sumner
[1] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[2] Larry Peterson,et al. Proceedings of the nineteenth ACM symposium on Operating systems principles , 2003, SOSP 2003.
[3] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[4] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[5] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[6] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[7] George C. Necula,et al. SafeDrive: safe and recoverable extensions using language-based techniques , 2006, OSDI '06.
[8] Sriram K. Rajamani,et al. Thorough static analysis of device drivers , 2006, EuroSys.
[9] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[10] Emin Gün Sirer,et al. Device Driver Safety Through a Reference Validation Mechanism , 2008, OSDI.
[11] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[12] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[13] Somesh Jha,et al. The design and implementation of microdrivers , 2008, ASPLOS.
[14] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[15] Zhi Wang,et al. Countering Persistent Kernel Rootkits through Systematic Hook Discovery , 2008, RAID.
[16] Neha Narula,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, IEEE Symposium on Security and Privacy.
[17] Xuxian Jiang,et al. Multi-aspect profiling of kernel rootkit behavior , 2009, EuroSys '09.
[18] Miguel Castro,et al. Fast byte-granularity software fault isolation , 2009, SOSP '09.
[19] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[20] George Candea,et al. Testing Closed-Source Binary Device Drivers with DDT , 2010, USENIX Annual Technical Conference.
[21] George Candea,et al. Reverse engineering of binary device drivers with RevNIC , 2010, EuroSys '10.
[22] Silas Boyd-Wickizer,et al. Tolerating Malicious Device Drivers in Linux , 2010, USENIX Annual Technical Conference.
[23] Ananth Mavinakayanahalli,et al. Probing the Guts of Kprobes , 2010 .
[24] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[25] Peter Druschel,et al. Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles , 2011, SOSP 2011.
[26] Abhinav Srivastava,et al. Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.
[27] Donghai Tian,et al. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions , 2011, NDSS.
[28] Xi Wang,et al. Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.
[29] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[30] Asim Kadav,et al. SymDrive: Testing Drivers without Devices , 2012, OSDI.