Using an in-kernel hypervisor to protect the integrity of operating system

被引:0
|
作者
Chen, Zhixian [1 ,2 ]
Cui, Jun [2 ,3 ]
Liu, Wei [2 ]
Huang, Hao [2 ]
Xu, Bin [1 ]
机构
[1] School of Computer Science and Information Engineering, Zhejiang Gongshang University, No. 18, Xuezheng Street, Xiasha University Town, Hangzhou 310018, China
[2] State Key Laboratory for Novel Software, Nanjing University, No. 22, Hankou Road, Gulou District, Nanjing 210093, China
[3] No. 28 Research Institute, China Electronic Technology Group Corporation, No. 1, Muxuyuan East Street, Baixia District, Nanjing 210007, China
来源
ICIC Express Letters | 2014年 / 8卷 / 08期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2357 / 2363
相关论文
共 50 条
  • [1] Using an In-kernel Hypervisor to Protect the Integrity of Operating System
    Chen, Zhi-xian
    Cui, Jun
    Liu, Wei
    Huang, Hao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 94 - 97
  • [2] Ensuring Operating System Kernel Integrity with OSck
    Hofmann, Owen S.
    Dunn, Alan M.
    Kim, Sangman
    Roy, Indrajit
    Witchel, Emmett
    ACM SIGPLAN NOTICES, 2011, 46 (03) : 279 - 290
  • [3] I3FS:: An in-kernel integrity checker and intrusion detection file system
    Patil, S
    Kashyap, A
    Sivathanu, G
    Zadok, E
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTEENTH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE, 2004, : 67 - 77
  • [4] Performance Evaluation of In-kernel System Calls
    Condurache, Cristian
    Mogosanu, Lucian
    Carabas, Mihai
    Gheorghe, Laura
    Tapus, Nicolae
    FOURTH EASTERN EUROPEAN REGIONAL CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS ECBS-EERC 2015, 2015, : 130 - 133
  • [5] In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
    Yoo, Sungbae
    Park, Jinbum
    Kim, Seolheui
    Kim, Yeji
    Kim, Taesoo
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 89 - 106
  • [6] In-kernel control-flow integrity on commodity OSes using ARM pointer authentication
    Samsung Research
    不详
    arXiv,
  • [7] In-kernel integration of operating system and infiniband functions for high performance computing clusters: A DSM example
    Liss, L
    Birk, Y
    Schuster, A
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2005, 16 (09) : 830 - 840
  • [8] Virtualization of Operating System Using Type-2 Hypervisor
    Vojtesek, Jiri
    Pipis, Martin
    SOFTWARE ENGINEERING PERSPECTIVES AND APPLICATION IN INTELLIGENT SYSTEMS, VOL 2, 2016, 465 : 239 - 247
  • [9] Using an in-kernel emulator for TPS development and testing
    Hicks, F
    AUTOTESTCON 2004, PROCEEDINGS: TECHNOLOGY AND TRADITION UNITE IN SAN ANTONIO, 2004, : 268 - 272
  • [10] BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel
    Feng, Xinyue
    Yang, Qiusong
    Shi, Lin
    Wang, Qing
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 13 - 24