Return-Oriented Programming Attack on the Xen Hypervisor
暂无分享,去创建一个
[1] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[2] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[3] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[4] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[6] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[7] Jiang Wang,et al. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor , 2013 .
[8] Rafal Wojtczuk. Subverting the Xen hypervisor , 2008 .
[9] Hovav Shacham,et al. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage , 2009, EVT/WOTE.
[10] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[11] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[12] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[13] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[14] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[15] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[16] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[18] Chun-Kun,et al. Lecture Note Sel4: Formal Verification of an Os Kernel , 2022 .
[19] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[20] Shigeru Chiba,et al. BitVisor: a thin hypervisor for enforcing i/o device security , 2009, VEE '09.
[21] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[22] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[23] Yeping He,et al. Improving Flask Implementation Using Hardware Assisted In-VM Isolation , 2012, SEC.
[24] Fx ' Lindner. Developments in Cisco IOS Forensics , 2008 .
[25] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.