M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-40, 2009.
DOI : 10.1145/1609956.1609960

S. Bratus, M. Locasto, A. Ramaswamy, and S. Smith, VM-based security overkill, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, pp.51-60, 2010.
DOI : 10.1145/1900546.1900554

B. Cantrill, M. Shapiro, and A. Leventhal, Dynamic instrumentation of production systems, Proceedings of the USENIX Annual Technical Conference, pp.15-28, 2004.

N. Falliere, L. O. Murchu, E. Chien, and W. , Stuxnet Dossier, Symantec, Mountain View, California (www.symantec.com/content, 2011.

S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff, A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.120-128, 1996.
DOI : 10.1109/SECPRI.1996.502675

B. Hicks, S. Rueda, T. Jaeger, and P. Mcdaniel, From trusted to secure: Building and executing applications that enforce system security, Proceedings of the USENIX Annual Technical Conference, 2007.

X. Jiang, X. Wang, and D. Xu, Stealthy malware detection through VMMbased " out-of-the-box " semantic view reconstruction, Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, pp.128-138, 2007.

C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou et al., Effective and efficient malware detection at the end host, Proceedings of the Eighteenth USENIX Security Symposium, pp.351-366, 2009.

B. Lee, S. Moon, and Y. Lee, Application-specific packet capturing using kernel probes, Proceedings of the Eleventh IFIP/IEEE International Conference on Symposium on Integrated Network Management, pp.303-306, 2009.

M. Lemay and C. Gunter, Cumulative attestation kernels for embedded systems, Proceedings of the Fourteenth European Symposium on Research in Computer Security, pp.655-670, 2009.

J. Levine, J. Grizzard, and H. Owen, A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table, Second IEEE International Information Assurance Workshop, 2004. Proceedings., pp.107-125, 2004.
DOI : 10.1109/IWIA.2004.1288042

L. Litty and H. , Lagar-Cavilla and D. Lie, Hypervisor support for identifying covertly executing binaries, Proceedings of the Seventeenth USENIX Security Symposium, pp.243-258, 2008.

A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, and M. Hiramatsu, Probing the guts of Kprobes, Proceedings of the Linux Symposium, pp.109-124, 2006.

L. Mcvoy and C. Staelin, lmbench: Portable tools for performance analysis, Proceedings of the USENIX Annual Technical Conference, 1996.

T. Mittner, Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide (resources.infosecinstitute.com/exploiting-gresecuritypax), 2011.

I. Molnar, NX (No eXecute) support for x86, 2.6.7-rc2-bk2, Linux Kernel Mailing List (lkml.org/lkml, 2004.

. Openwall, Linux kernel patch from the Openwall Project (www.openwall .com/linux)

B. Payne, M. Carbone, M. Sharif, and W. Lee, Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.233-247, 2008.
DOI : 10.1109/SP.2008.24

N. Petroni, T. Fraser, J. Molina, and W. Arbaugh, Copilot ? A coprocessorbased kernel runtime integrity monitor, Proceedings of the Thirteenth USENIX Security Symposium, pp.179-194, 2004.

N. Petroni and M. Hicks, Automated detection of persistent kernel control-flow attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.103-115, 2007.
DOI : 10.1145/1315245.1315260

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.4713

V. Prasad, W. Cohen, F. Eigler, M. Hunt, J. Keniston et al., Locating system problems using dynamic instrumentation, Proceedings of the Linux Symposium, pp.49-64, 2005.

P. Proctor, The Practical Intrusion Detection Handbook, 2001.

A. Ramaswamy, Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, 2009.

R. Riley, X. Jiang, and D. Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.1-20, 2008.
DOI : 10.1007/978-3-540-87403-4_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.4830

D. Singh and W. Kaiser, The Atom LEAP Platform for Energy-Efficient Embedded Computing, 2010.

R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-316, 2010.
DOI : 10.1109/SP.2010.25

. Sourceforge and . Net, Linux Test Project (ltp.sourceforge.net)

V. Thampi, udis86 Disassembler Library for x86 and x86-64 (udis86.sf, 2009.

Z. Wang, X. Jiang, W. Cui, and P. Ning, Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009.
DOI : 10.1145/1653662.1653728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928