TrustDump: Reliable Memory Acquisition on Smartphones
暂无分享,去创建一个
Sushil Jajodia | Yuewu Wang | Kun Sun | Jiwu Jing | He Sun | S. Jajodia | Jiwu Jing | Kun Sun | Yuewu Wang | He Sun
[1] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[2] Emmett Witchel,et al. Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.
[3] Weidong Shi,et al. CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM , 2013, ISCA.
[4] Xiangyu Zhang,et al. SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization , 2013, ACSAC.
[5] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[6] Ing. M. F. Breeuwsma. Forensic imaging of embedded systems using JTAG (boundary-scan) , 2006, Digit. Investig..
[7] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[8] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[9] Stephen McCamant,et al. Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems , 2012, USENIX Annual Technical Conference.
[10] Jason Nieh,et al. KVM/ARM: the design and implementation of the linux ARM hypervisor , 2014, ASPLOS.
[11] Golden G. Richard,et al. Acquisition and analysis of volatile memory from android devices , 2012, Digit. Investig..
[12] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[13] Angelos Stavrou,et al. SPECTRE: A dependable introspection framework via System Management Mode , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[14] Jason Nieh,et al. KVM for ARM , 2010 .
[15] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[16] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[17] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[18] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.
[19] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[20] Andri P. Heriyanto,et al. Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones , 2013 .
[21] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[22] Jiang Wang,et al. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor , 2013 .
[23] Maurizio Rossi,et al. Internal forensic acquisition for mobile equipments , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[24] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[25] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[26] Jonathon T. Giffin,et al. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2011, 2011 IEEE Symposium on Security and Privacy.
[27] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.