A lightweight live memory forensic approach based on hardware virtualization
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Xiao Fu | Bin Luo | Yingxin Cheng | M. Guizani | Xiaojiang Du | Yingxin Cheng | Xiao Fu | B. Luo
[1] Giovanni Vigna,et al. MalGene: Automatic Extraction of Malware Analysis Evasion Signature , 2015, CCS.
[2] Xiaolei Wang,et al. SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI , 2015, ICCCS.
[3] Aggelos Kiayias,et al. Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system , 2014, ACSAC.
[4] Rui Yang,et al. Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics , 2014, ISC.
[5] Xuxian Jiang,et al. Data-Centric OS Kernel Malware Characterization , 2014, IEEE Transactions on Information Forensics and Security.
[6] Miao Yu,et al. A Virtualization Based Monitoring System for Mini-intrusive Live Forensics , 2013, International Journal of Parallel Programming.
[7] Xiangyu Zhang,et al. SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization , 2013, ACSAC.
[8] Yunheung Paek,et al. Vigilare: toward snoop-based kernel integrity monitor , 2012, CCS '12.
[9] Chen-Ching Liu,et al. Evasion-resistant malware signature based on profiling kernel data structure objects , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[10] Miao Yu,et al. Vis: Virtualization enhanced live forensics acquisition for native system , 2012, Digit. Investig..
[11] Jiang Wang,et al. Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[12] Julian B. Grizzard,et al. Locating ×86 paging structures in memory images , 2010, Digit. Investig..
[13] Lorenzo Martignoni,et al. Live and Trustworthy Forensic Analysis of Commodity Production Systems , 2010, RAID.
[14] Heng Yin,et al. HookScout: Proactive Binary-Centric Hook Detection , 2010, DIMVA.
[15] Manoj B. Athreya. Subverting Linux on-the-fly using hardware virtualization technology , 2010 .
[16] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[17] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[18] Xuxian Jiang,et al. Multi-aspect profiling of kernel rootkit behavior , 2009, EuroSys '09.
[19] Xuxian Jiang,et al. Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring , 2009, 2009 International Conference on Availability, Reliability and Security.
[20] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[21] Thomas Wilhelm,et al. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , 2007 .
[22] Ali Reza Arasteh,et al. Forensic memory analysis: From stack and code to execution history , 2007, Digit. Investig..
[23] Bradley L. Schatz,et al. BodySnatcher: Towards reliable volatile memory acquisition by software , 2007, Digit. Investig..
[24] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.