On the Trustworthiness of Memory Analysis—An Empirical Study from the Perspective of Binary Execution
暂无分享,去创建一个
[1] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[2] Zhi Wang,et al. Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring , 2011, CCS '11.
[3] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[4] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[5] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[7] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[8] Xuxian Jiang,et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures , 2011, NDSS.
[9] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[10] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[11] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[12] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[13] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[16] Heng Yin,et al. Manipulating semantic values in kernel data structures: Attack assessments and implications , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[17] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[18] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[19] Zhenkai Liang,et al. Enforcing system-wide control flow integrity for exploit detection and diagnosis , 2013, ASIA CCS '13.
[20] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[21] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[22] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[23] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[24] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[25] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[26] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[27] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[28] Dan Boneh,et al. OpenConflict: Preventing Real Time Map Hacks in Online Games , 2011, 2011 IEEE Symposium on Security and Privacy.
[29] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[30] Heng Yin,et al. Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform , 2014, ISSTA 2014.
[31] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[32] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.