MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
暂无分享,去创建一个
Samuel T. King | Nabil Schear | Hai D. Nguyen | Apeksha Godiyal | Anh M. Nguyen | HeeDong Jung | Hai D. Nguyen | N. Schear | Apeksha Godiyal | Anh Nguyen | HeeDong Jung
[1] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[2] Elaine J. Weyuker,et al. The distribution of faults in a large industrial software system , 2002, ISSTA '02.
[3] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[4] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[5] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Victor R. Basili,et al. Software errors and complexity: an empirical investigation0 , 1984, CACM.
[7] Michael Franz. Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[8] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[9] Rafal Wojtczuk,et al. Adventures with a certain Xen vulnerability (in the PVFB backend) , 2008 .
[10] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[11] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[12] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[13] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[14] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[15] Adrian Perrig,et al. Remote detection of virtual machine monitors with fuzzy benchmarking , 2008, OPSR.
[16] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[17] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[18] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[19] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[20] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[21] Shigeru Chiba,et al. HyperSpector: virtual distributed monitoring environments for secure intrusion detection , 2005, VEE '05.
[22] Helen J. Wang,et al. Virtual Playgrounds for Worm Behavior Investigation , 2005, RAID.
[23] Victor R. Basili,et al. Software errors and complexity: an empirical investigation , 1993 .
[24] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.