HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity

作者: Zhi Wang , Xuxian Jiang

DOI: 10.1109/SP.2010.30

关键词:

摘要: Virtualization is being widely adopted in today's computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …

参考文章(41)
Eyad Alkassar, Mark A. Hillebrand, Dirk C. Leinenbach, Norbert W. Schirmer, Artem Starostin, Alexandra Tsyban, Balancing the Load Journal of Automated Reasoning. ,vol. 42, pp. 389- 454 ,(2009) , 10.1007/S10817-009-9123-Z
Ryan Riley, Xuxian Jiang, Dongyan Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing recent advances in intrusion detection. pp. 1- 20 ,(2008) , 10.1007/978-3-540-87403-4_1
Wenke Lee, Monirul I. Sharif, Andrea Lanzi, K-Tracer: A System for Extracting Kernel Malware Behavior. network and distributed system security symposium. ,(2009)
Felix C. Freiling, Ralf Hund, Thorsten Holz, Return-oriented rootkits: bypassing kernel code integrity protection mechanisms usenix security symposium. pp. 383- 398 ,(2009)
Ulfar Erlingsson, Jay Ligatti, Martn Abadi, Mihai Budiu, Control-Flow Integrity - Principles, Implementations, and Applications computer and communications security. ,(2005)
Reiner Sailer, Leendert van Doorn, Trent Jaeger, Xiaolan Zhang, Design and implementation of a TCG-based integrity measurement architecture usenix security symposium. pp. 16- 16 ,(2004)
Kevin Elphinstone, Timothy Roscoe, Gernot Heiser, Hype and virtue HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems. pp. 4- ,(2007)
Tal Garfinkel, Peter M. Chen, Jim Chow, Decoupling dynamic program analysis from execution in virtual environments usenix annual technical conference. pp. 1- 14 ,(2008)
RICHARD J. FEIERTAG, PETER G. NEUMANN, The foundations of a provably secure operating system (PSOS) 1979 International Workshop on Managing Requirements Knowledge (MARK). pp. 329- 334 ,(1979) , 10.1109/MARK.1979.8817256
Mariam Kamkar, John Wilander, A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention network and distributed system security symposium. pp. 149- ,(2003)