Robust signatures for kernel data structures
暂无分享,去创建一个
Abhinav Srivastava | Jonathon T. Giffin | Patrick Traynor | Brendan Dolan-Gavitt | Brendan Dolan-Gavitt | Patrick Traynor | Abhinav Srivastava
[1] Arati Baliga,et al. Automatic Inference and Enforcement of Kernel Data Structure Invariants , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[2] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[3] James R. Larus,et al. Cache-conscious structure definition , 1999, PLDI '99.
[4] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[5] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[6] Nick L. Petroni,et al. Volatools : Integrating Volatile Memory Forensics into the Digital Investigation Process , 2007 .
[7] Peter Oehlert,et al. Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..
[8] Andrea C. Arpaci-Dusseau,et al. VMM-based hidden process detection and identification using Lycosid , 2008, VEE '08.
[9] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[10] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[11] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[12] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[13] Diomidis Spinellis,et al. Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.
[14] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[15] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[16] Andrea C. Arpaci-Dusseau,et al. Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.
[17] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[18] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[19] Barton P. Miller,et al. An empirical study of the robustness of Windows NT applications using random testing , 2000 .
[20] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[21] Barton P. Miller,et al. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services , 1995 .
[22] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[23] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[24] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[25] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[26] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[27] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[28] Salvatore J. Stolfo,et al. On the infeasibility of modeling polymorphic shellcode , 2009, Machine Learning.
[29] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[30] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[31] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[32] Giovanni Vigna,et al. Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[33] Ben Liblit,et al. Dynamic heap type inference for program understanding and debugging , 2007, POPL '07.
[34] Satish Narayanasamy,et al. BugNet: continuously recording program execution for deterministic replay debugging , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).