SecPod: a framework for virtualization-based security systems

作者: Xiaoguang Wang , Yue Chen , Zhi Wang , Yong Qi , Yajin Zhou

DOI:

关键词:

摘要: … In this paper, we propose SecPod, an extensible framework for virtualization-based security systems that can provide both strong isolation and the compatibility with modern hardware. …

参考文章(50)
Ryan Riley, Xuxian Jiang, Dongyan Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing recent advances in intrusion detection. pp. 1- 20 ,(2008) , 10.1007/978-3-540-87403-4_1
Ulfar Erlingsson, Jay Ligatti, Martn Abadi, Mihai Budiu, Control-Flow Integrity - Principles, Implementations, and Applications computer and communications security. ,(2005)
John L. Hennessy, David A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach Computer Architecture, Fifth Edition: A Quantitative Approach 5th. pp. 880- 880 ,(2011)
Georgios Portokalidis, Angelos D. Keromytis, Vasileios P. Kemerlis, kGuard: lightweight kernel protection against return-to-user attacks usenix security symposium. pp. 39- 39 ,(2012)
David Lie, Lionel Litty, H. Andrés Lagar-Cavilla, Hypervisor support for identifying covertly executing binaries usenix security symposium. pp. 243- 258 ,(2008)
John L. Hennessy, David A. Patterson, Computer Architecture: A Quantitative Approach ,(1989)
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)
P.M. Chen, B.D. Noble, When virtual is better than real [operating system relocation to virtual machines] Proceedings Eighth Workshop on Hot Topics in Operating Systems. pp. 133- 138 ,(2001) , 10.1109/HOTOS.2001.990073
Xuxian Jiang, Xinyuan Wang, Out-of-the-Box monitoring of VM-based high-interaction honeypots recent advances in intrusion detection. pp. 198- 218 ,(2007) , 10.1007/978-3-540-74320-0_11
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu, Process out-grafting Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 363- 374 ,(2011) , 10.1145/2046707.2046751