Graph-based signatures for kernel data structures
暂无分享,去创建一个
[1] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[2] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[3] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[4] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[5] Thomas W. Reps,et al. DIVINE: DIscovering Variables IN Executables , 2007, VMCAI.
[6] Wolfgang Golubski,et al. Object-oriented Type Inference by Type Binding Analysis , 1994 .
[7] Thomas W. Reps,et al. Improved Memory-Access Analysis for x86 Executables , 2008, CC.
[8] Theodore Tryfonas,et al. Acquiring volatile operating system data tools and techniques , 2008, OPSR.
[9] Jens Palsberg,et al. Object-oriented type inference , 1991, OOPSLA 1991.
[10] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[11] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[12] Frank Tip,et al. Aggregate structure identification and its application to program analysis , 1999, POPL '99.
[13] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[14] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[15] Dongyan Xu,et al. LiveDM : Temporal Mapping of Dynamic Kernel Memory for Dynamic Kernel Malware Analysis and Debugging , 2009 .
[16] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[17] Robert O'Callahan,et al. Lackwit: A Program Understanding Tool Based on Type Inference , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[18] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[19] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[20] Stephen McCamant,et al. Dynamic inference of abstract types , 2006, ISSTA '06.
[21] Ben Liblit,et al. Dynamic heap type inference for program understanding and debugging , 2007, POPL '07.
[22] Paul Movall,et al. Linux Physical Memory Analysis , 2005, USENIX Annual Technical Conference, FREENIX Track.
[23] William G. Griswold,et al. Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[24] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[25] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[26] Golden G. Richard,et al. FACE: Automated digital evidence discovery and correlation , 2008, Digit. Investig..
[27] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.