Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems

作者: Xiaoguang Wang , Yong Qi , Zhi Wang , Yue Chen , Yajin Zhou

DOI: 10.1109/TDSC.2017.2675991

关键词:

摘要: … In this paper, we present the design and implementation of SecPod, a practical and extensible framework for virtualization-based security systems that can provide both strong isolation …

参考文章(48)
Ryan Riley, Xuxian Jiang, Dongyan Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing recent advances in intrusion detection. pp. 1- 20 ,(2008) , 10.1007/978-3-540-87403-4_1
Georgios Portokalidis, Angelos D. Keromytis, Vasileios P. Kemerlis, kGuard: lightweight kernel protection against return-to-user attacks usenix security symposium. pp. 39- 39 ,(2012)
David Lie, Lionel Litty, H. Andrés Lagar-Cavilla, Hypervisor support for identifying covertly executing binaries usenix security symposium. pp. 243- 258 ,(2008)
John L. Hennessy, David A. Patterson, Computer Architecture: A Quantitative Approach ,(1989)
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)
P.M. Chen, B.D. Noble, When virtual is better than real [operating system relocation to virtual machines] Proceedings Eighth Workshop on Hot Topics in Operating Systems. pp. 133- 138 ,(2001) , 10.1109/HOTOS.2001.990073
Xuxian Jiang, Xinyuan Wang, Out-of-the-Box monitoring of VM-based high-interaction honeypots recent advances in intrusion detection. pp. 198- 218 ,(2007) , 10.1007/978-3-540-74320-0_11
Saumya K. Debray, Matti A. Hiltunen, Mohan Rajagopalan, Richard D. Schlichting, Cassyopia: compiler assisted system optimization hot topics in operating systems. pp. 18- 18 ,(2003)
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu, Process out-grafting Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 363- 374 ,(2011) , 10.1145/2046707.2046751
T. Murray, D. Matichuk, M. Brassil, P. Gammie, T. Bourke, S. Seefried, C. Lewis, Xin Gao, G. Klein, seL4: From General Purpose to a Proof of Information Flow Enforcement ieee symposium on security and privacy. pp. 415- 429 ,(2013) , 10.1109/SP.2013.35