Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-40, 2009. ,
DOI : 10.1145/1609956.1609960
VM-based security overkill, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, pp.51-60, 2010. ,
DOI : 10.1145/1900546.1900554
Dynamic instrumentation of production systems, Proceedings of the USENIX Annual Technical Conference, pp.15-28, 2004. ,
Stuxnet Dossier, Symantec, Mountain View, California (www.symantec.com/content, 2011. ,
A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.120-128, 1996. ,
DOI : 10.1109/SECPRI.1996.502675
From trusted to secure: Building and executing applications that enforce system security, Proceedings of the USENIX Annual Technical Conference, 2007. ,
Stealthy malware detection through VMMbased " out-of-the-box " semantic view reconstruction, Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, pp.128-138, 2007. ,
Effective and efficient malware detection at the end host, Proceedings of the Eighteenth USENIX Security Symposium, pp.351-366, 2009. ,
Application-specific packet capturing using kernel probes, Proceedings of the Eleventh IFIP/IEEE International Conference on Symposium on Integrated Network Management, pp.303-306, 2009. ,
Cumulative attestation kernels for embedded systems, Proceedings of the Fourteenth European Symposium on Research in Computer Security, pp.655-670, 2009. ,
A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table, Second IEEE International Information Assurance Workshop, 2004. Proceedings., pp.107-125, 2004. ,
DOI : 10.1109/IWIA.2004.1288042
Lagar-Cavilla and D. Lie, Hypervisor support for identifying covertly executing binaries, Proceedings of the Seventeenth USENIX Security Symposium, pp.243-258, 2008. ,
Probing the guts of Kprobes, Proceedings of the Linux Symposium, pp.109-124, 2006. ,
lmbench: Portable tools for performance analysis, Proceedings of the USENIX Annual Technical Conference, 1996. ,
Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide (resources.infosecinstitute.com/exploiting-gresecuritypax), 2011. ,
NX (No eXecute) support for x86, 2.6.7-rc2-bk2, Linux Kernel Mailing List (lkml.org/lkml, 2004. ,
Linux kernel patch from the Openwall Project (www.openwall .com/linux) ,
Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.233-247, 2008. ,
DOI : 10.1109/SP.2008.24
Copilot ? A coprocessorbased kernel runtime integrity monitor, Proceedings of the Thirteenth USENIX Security Symposium, pp.179-194, 2004. ,
Automated detection of persistent kernel control-flow attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.103-115, 2007. ,
DOI : 10.1145/1315245.1315260
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.4713
Locating system problems using dynamic instrumentation, Proceedings of the Linux Symposium, pp.49-64, 2005. ,
The Practical Intrusion Detection Handbook, 2001. ,
Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, 2009. ,
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.1-20, 2008. ,
DOI : 10.1007/978-3-540-87403-4_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.4830
The Atom LEAP Platform for Energy-Efficient Embedded Computing, 2010. ,
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-316, 2010. ,
DOI : 10.1109/SP.2010.25
Linux Test Project (ltp.sourceforge.net) ,
udis86 Disassembler Library for x86 and x86-64 (udis86.sf, 2009. ,
Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009. ,
DOI : 10.1145/1653662.1653728
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928