Semi-synchronized Non-blocking Concurrent Kernel Cruising
暂无分享,去创建一个
[1] Xuxian Jiang,et al. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory , 2010, RAID.
[2] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[3] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[4] Ramesh Karri,et al. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[6] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[7] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[8] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[9] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[10] Tsutomu Hoshino,et al. The PAX project , 1992 .
[11] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[12] Christoforos E. Kozyrakis,et al. Real-World Buffer Overflow Protection for Userspace and Kernelspace , 2008, USENIX Security Symposium.
[13] Xuxian Jiang,et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures , 2011, NDSS.
[14] Bo Li,et al. ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation , 2018, RAID.
[15] Yutao Liu,et al. Concurrent and consistent virtual machine introspection with hardware transactional memory , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[16] E. Berger. HeapShield : Library-Based Heap Overflow Protection for Free , 2006 .
[17] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[18] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[19] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[20] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[21] Deepak Gupta,et al. TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection , 2004, USENIX Security Symposium.
[22] Emery D. Berger,et al. DieHarder: securing the heap , 2010, CCS '10.
[23] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.
[24] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.
[25] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[26] David Mosberger,et al. Memory consistency models , 1993, OPSR.
[27] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[28] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[29] Changzhen Hu,et al. Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring , 2012, NDSS.
[30] Michael Rodeh,et al. CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.
[31] Peng Liu,et al. Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures , 2011, PLDI '11.
[32] Patroklos Argyroudis,et al. Protecting the Core Kernel Exploitation Mitigations , 2011 .
[33] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[34] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[35] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[36] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[37] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[38] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[39] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[40] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[41] Jiang Wang,et al. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor , 2013 .
[42] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[43] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[44] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[45] Wenke Lee,et al. UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages , 2016, CCS.
[46] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[47] Navjot Singh,et al. Libsafe: transparent system-wide protection against buffer overflow attacks , 2002, Proceedings International Conference on Dependable Systems and Networks.
[48] Michael Franz,et al. Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space , 2009, EuroSys '09.
[49] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[50] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[51] Koen Koning,et al. kMVX: Detecting Kernel Information Leaks with Multi-variant Execution , 2019, ASPLOS.
[52] Emmett Witchel,et al. Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.
[53] Shigeru Chiba,et al. HyperSpector: virtual distributed monitoring environments for secure intrusion detection , 2005, VEE '05.
[54] Vijay Varadharajan,et al. VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment , 2020, IEEE Transactions on Cloud Computing.
[55] Paul E. McKenney,et al. Memory Barriers: a Hardware View for Software Hackers , 2010 .
[56] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[57] William R. Harris,et al. Enforcing Kernel Security Invariants with Data Flow Integrity. , 2016, NDSS 2016.
[58] T. Mandt,et al. Kernel Pool Exploitation on Windows 7 , 2011 .
[59] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[60] Wolfgang Mauerer,et al. Professional Linux Kernel Architecture , 2008 .
[61] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[62] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.