SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
暂无分享,去创建一个
Adrian Perrig | Arvind Seshadri | Mark Luk | Ning Qu | A. Perrig | Arvind Seshadri | M. Luk | Ning Qu | Mark Luk
[1] John von Neumann,et al. First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.
[2] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[3] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[4] Ronald Minnich,et al. The Linux BIOS , 2000, Annual Linux Showcase & Conference.
[5] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[6] Paul E. Jones,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[7] Keith J. Jones,et al. Loadable Kernel Modules , 2001, Login: The Usenix Magazine.
[8] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[9] Anton Chuvakin,et al. Ups and Downs of UNIX/Linux Host-Based Security Solutions , 2003, Login: The Usenix Magazine.
[10] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[11] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[12] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[13] Yi-Min Wang,et al. Strider GhostBuster: Why It’s A Bad Idea For Stealth Software To Hide Files , 2004 .
[14] Yi-Min Wang,et al. AskStrider: What Has Changed on My Machine Lately? , 2004 .
[15] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[16] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[17] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[18] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[19] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.