Sciweavers

7 search results - page 2 / 2
» Rethinking Memory Permissions for Protection Against Cross-L...
Sort
View
CCS
2009
ACM
14 years 5 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 4 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...