Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System
暂无分享,去创建一个
Weiqing Sun | Fangyang Shen | Mohammed Y. Niamat | Saketh Bharadwaja | Weiqing Sun | Fangyang Shen | M. Niamat | S. Bharadwaja
[1] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[2] M. Schunter,et al. An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement , 2006 .
[3] Angelos D. Keromytis,et al. e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[6] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[7] Gernot Heiser,et al. Towards Untrusted Device Drivers , 2003 .
[8] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] John McHugh,et al. Coding for a Believable Specification to Implementation Mapping , 1987, 1987 IEEE Symposium on Security and Privacy.
[10] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[11] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[12] Tavis Ormandy. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis , 2007 .
[13] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[14] Kaoru Kurosawa,et al. OMAC: One-Key CBC MAC , 2003, IACR Cryptol. ePrint Arch..
[15] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[16] Christian S. Collberg,et al. Protecting Against Unexpected System Calls , 2005, USENIX Security Symposium.
[17] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[18] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.