Dymo: Tracking Dynamic Code Identity
暂无分享,去创建一个
[1] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[2] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[3] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[4] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[5] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[6] Adrian Perrig,et al. Bootstrapping Trust in Commodity Computers , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Jaap A. Haitsma,et al. Robust Audio Hashing for Content Identification , 2001 .
[8] Stephen Fewer. Reflective Dll Injection , 2008 .
[9] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[10] Dieter Gollmann,et al. Computer Security – ESORICS 2003 , 2003, Lecture Notes in Computer Science.
[11] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[12] Salvatore J. Stolfo,et al. A Network Access Control Mechanism Based on Behavior Profiles , 2009, 2009 Annual Computer Security Applications Conference.
[13] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[14] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[15] Nick Feamster,et al. Packets with Provenance , 2008 .
[16] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[17] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[18] Dionysus Blazakis. Interpreter Exploitation , 2010, WOOT.
[19] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.
[20] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.