Cross-layer comprehensive intrusion harm analysis for production workload server systems
暂无分享,去创建一个
[1] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[2] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[3] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[4] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[5] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[6] Zhi Wang,et al. Countering Persistent Kernel Rootkits through Systematic Hook Discovery , 2008, RAID.
[7] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[8] Xiaoqi Jia,et al. SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System , 2009, 2009 Annual Computer Security Applications Conference.
[9] Fred B. Schneider,et al. Hypervisor-based fault tolerance , 1996, TOCS.
[10] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[11] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[12] Michael Burrows,et al. Eraser: a dynamic data race detector for multithreaded programs , 1997, TOCS.
[13] Nicholas Nethercote,et al. Using Valgrind to Detect Undefined Value Errors with Bit-Precision , 2005, USENIX Annual Technical Conference, General Track.
[14] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[15] Min Xu. ReTrace : Collecting Execution Trace with Virtual Machine Deterministic Replay , 2007 .
[16] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[17] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[18] Xiaoqi Jia,et al. Availability-sensitive intrusion recovery , 2009, VMSec '09.
[19] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[20] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.