SeCom: A Novel Approach for MalwareConfiscation in OS level Virtual Machines
暂无分享,去创建一个
[1] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[2] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[3] Yang Yu,et al. A feather-weight virtual machine for windows applications , 2006, VEE '06.
[4] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[5] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[6] Shan Lu,et al. Flight data recorder: monitoring persistent-state interactions to improve systems management , 2006, OSDI '06.
[7] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[8] Hao Chen,et al. Back to the Future: A Framework for Automatic Malware Removal and System Repair , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[9] Robert N. M. Watson,et al. Jails: confining the omnipotent root , 2000 .
[10] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[11] Eric Totel,et al. COTS Diversity Based Intrusion Detection and Application to Web Servers , 2005, RAID.
[12] Larry L. Peterson,et al. Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors , 2007, EuroSys '07.
[13] Yang Yu,et al. Applications of a feather-weight virtual machine , 2008, VEE '08.
[14] Zhenkai Liang,et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments , 2005, NDSS.
[15] Bev Littlewood,et al. Redundancy and Diversity in Security , 2004, ESORICS.
[16] Hong Chen,et al. Usable Mandatory Integrity Protection for Operating Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Somesh Jha,et al. Automatic Generation of Remediation Procedures for Malware Infections , 2010, USENIX Security Symposium.
[18] Daniel Price,et al. Solaris Zones: Operating System Support for Consolidating Commercial Workloads , 2004, LISA.