CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring
暂无分享,去创建一个
[1] Carsten Willems,et al. Down to the bare metal: using processor features for binary analysis , 2012, ACSAC '12.
[2] Wenke Lee,et al. Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection , 2012, RAID.
[3] Wenke Lee,et al. Impeding Automated Malware Analysis with Environment-sensitive Malware , 2012, HotSec.
[4] Xiangyu Zhang,et al. IntroLib: Efficient and transparent library call introspection for malware forensics , 2012 .
[5] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Mu Zhang,et al. V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis , 2012, VEE '12.
[7] Bridging the Semantic Gap Through Static Code Analysis , 2012 .
[8] Claudia Eckert,et al. Nitro: Hardware-Based System Call Tracing for Virtual Machines , 2011, IWSEC.
[9] Christopher Krügel,et al. The power of procrastination: detection and mitigation of execution-stalling malicious code , 2011, CCS '11.
[10] Zhi Wang,et al. Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring , 2011, CCS '11.
[11] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[12] Xuxian Jiang,et al. Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots , 2011, SecureComm.
[13] Brent Waters,et al. Cloaking Malware with the Trusted Platform Module , 2011, USENIX Security Symposium.
[14] Stephen McCamant,et al. Differential Slicing: Identifying Causal Execution Differences for Security Applications , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[16] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[17] Xuxian Jiang,et al. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory , 2010, RAID.
[18] Lorenzo Martignoni,et al. Testing system virtual machines , 2010, ISSTA '10.
[19] Christopher Krügel,et al. Identifying Dormant Functionality in Malware Programs , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Xuxian Jiang,et al. Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction , 2010, TSEC.
[21] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[22] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[23] Raheem A. Beyah,et al. Toward Revealing Kernel Malware Behavior in Virtual Execution Environments , 2009, RAID.
[24] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[25] Steven Hand,et al. Satori: Enlightened Page Sharing , 2009, USENIX Annual Technical Conference.
[26] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[27] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[28] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[29] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[30] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[31] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[32] Brent Waters,et al. Analysis-Resistant Malware , 2008, NDSS.
[33] Michael Becher,et al. Kernel-Level Interception and Applications on Mobile Devices , 2008 .
[34] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[35] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[36] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[37] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[38] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[39] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[40] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[41] Zhendong Su,et al. Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.
[42] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[43] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[44] Samuel T. King,et al. Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.
[45] Iain D. Craig,et al. Virtual machines , 2005 .
[46] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[47] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[48] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[49] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[50] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.