Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
暂无分享,去创建一个
[1] Tom Perrine. The Kernelized Secure Operating System (KSOS) , 2002, login Usenix Mag..
[2] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[4] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[5] Alexander W. Koehler. Trusted Computing: From Theory to Practice in the Real World , 2004, ISSE.
[6] John C. Knight,et al. A Safety Kernel Architecture , 1994 .
[7] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Sara Reese Hedberg. HP's International Cryptography Framework: Compromise or Threat? , 1997, Computer.
[9] S. Harrison,et al. Long-COVID Symptoms in Individuals Infected with Different SARS-CoV-2 Variants of Concern: A Systematic Review of the Literature , 2022, Viruses.
[10] Morrie Gasser,et al. Security Kernel Design and Implementation: An Introduction , 1983, Computer.
[11] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[12] A. Kohn. [Computer viruses]. , 1989, Harefuah.