"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
暂无分享,去创建一个
[1] Norihisa Doi,et al. An efficient and generic reversible debugger using the virtual machine based approach , 2005, VEE '05.
[2] Eugene H. Spafford,et al. Poly/sup 2/ paradigm: a secure network service architecture , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[3] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[4] Xuxian Jiang,et al. Towards a VMM-based usage control framework for OS kernel integrity protection , 2007, SACMAT '07.
[5] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.
[6] Adrian Perrig,et al. Remote detection of virtual machine monitors with fuzzy benchmarking , 2008, OPSR.
[7] Samuel T. King,et al. Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.
[8] Shigeru Chiba,et al. HyperSpector: virtual distributed monitoring environments for secure intrusion detection , 2005, VEE '05.
[9] Felicia Nicastro. Zero-Day Attack , 2005 .
[10] James P. Early,et al. Poly2 Paradigm: A Secure Network Service Architecture∗ , 2003 .
[11] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[12] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[13] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[14] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[15] Peter Szor,et al. An Analysis of the Slapper Worm Ex-ploit , 2003 .
[16] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[17] Roy T. Fielding,et al. The Apache HTTP Server Project , 1997, IEEE Internet Comput..
[18] Steven D. Gribble,et al. Using time travel to diagnose computer problems , 2004, EW 11.
[19] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[20] Jeff Dike,et al. User-mode Linux , 2006, Annual Linux Showcase & Conference.
[21] Marc Dacier,et al. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots , 2006, RAID.
[22] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[23] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[24] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[25] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[26] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[27] David Lie,et al. Using VMM-based sensors to monitor honeypots , 2006, VEE '06.
[28] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[29] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[30] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[31] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[32] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[33] D. Simard. Tech Trend Notes Preview of Tomorrow ’ s Information Technologies , .
[34] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[35] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[36] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[37] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.