SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
暂无分享,去创建一个
Ning Zhang | Jianhua Sun | Kun Sun | Qi Li | Shengye Wan
[1] Yunheung Paek,et al. Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices , 2016, USENIX Annual Technical Conference.
[2] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[3] Emmett Witchel,et al. Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.
[4] Bart Preneel,et al. Hash functions , 2005, Encyclopedia of Cryptography and Security.
[5] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[6] Trent Jaeger,et al. Secure coprocessor-based intrusion detection , 2002, EW 10.
[7] Ning Zhang,et al. TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices , 2016, IACR Cryptol. ePrint Arch..
[8] Alec Wolman,et al. Using ARM trustzone to build a trusted language runtime for mobile applications , 2014, ASPLOS.
[9] Westley Weimer,et al. Towards Transparent Introspection , 2016, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[10] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Xuxian Jiang,et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures , 2011, NDSS.
[12] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[13] Angelos Stavrou,et al. SPECTRE: A dependable introspection framework via System Management Mode , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[14] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[15] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[16] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[18] Weidong Shi,et al. CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM , 2013, ISCA.
[19] Radu Sion,et al. SoK: Introspections on Trust and the Semantic Gap , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Hongwei Zhang,et al. SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security , 2016, HASP 2016.
[21] Yunheung Paek,et al. KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object , 2019, IEEE Transactions on Dependable and Secure Computing.
[22] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[23] Trent Jaeger,et al. Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture , 2014, ArXiv.
[24] Yunheung Paek,et al. Vigilare: toward snoop-based kernel integrity monitor , 2012, CCS '12.
[25] Ning Zhang,et al. CacheKit: Evading Memory Introspection Using Cache Incoherence , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[26] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[27] Liviu Iftode,et al. Regulating ARM TrustZone Devices in Restricted Spaces , 2016, MobiSys.
[28] Sushil Jajodia,et al. TrustDump: Reliable Memory Acquisition on Smartphones , 2014, ESORICS.
[29] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[30] Kevin Leach,et al. LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis , 2016, NDSS.
[31] Brent Byunghoon Kang,et al. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment , 2015, NDSS.
[32] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[33] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Yuewu Wang,et al. TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[35] Jiang Wang,et al. A dependability analysis of hardware-assisted polling integrity checking systems , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[36] Zhiqiang Lin,et al. HYBRID-BRIDGE: Efficiently Bridging the Semantic Gap in Virtual Memory Introspection via Decoupled Execution and Training Memoization , 2014, NDSS 2014.
[37] Quan Chen,et al. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World , 2014, CCS.
[38] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[39] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[40] Mihailo Isakov,et al. Hermes: Secure heterogeneous multicore architecture design , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[41] Ning Zhang,et al. CaSE: Cache-Assisted Secure Execution on ARM Processors , 2016, 2016 IEEE Symposium on Security and Privacy (SP).