Process Implanting: A New Active Introspection Framework for Virtualization
暂无分享,去创建一个
Xuxian Jiang | Zhongshu Gu | Dongyan Xu | Zhui Deng | Dongyan Xu | Xuxian Jiang | Zhongshu Gu | Zhui Deng
[1] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[2] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[3] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[4] Kenneth P. Birman,et al. Proceedings of the twentieth ACM symposium on Operating systems principles , 2005, SOSP 2005.
[5] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.
[6] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[7] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[8] Leendert van Doorn,et al. Hardware virtualization trends , 2006, VEE '06.
[9] David Lie,et al. Manitou: a layer-below approach to fighting malware , 2006, ASID '06.
[10] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.
[11] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[12] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[13] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[14] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[15] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[16] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[17] Andrea C. Arpaci-Dusseau,et al. VMM-based hidden process detection and identification using Lycosid , 2008, VEE '08.
[18] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[19] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[20] David Gregg,et al. Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments , 2008, VEE 2008.
[21] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[22] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[23] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.