시스템 보안을 위한 하드웨어 기반 모니터 기술

  • Published : 2014.12.16

Abstract

Keywords

Acknowledgement

Supported by : 국방과학연구소

References

  1. Dmitri Alperovitch, Operation Aurora, Revealed: Operation Shady RAT
  2. Petroni Jr, Nick L., et al. "Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor." USENIX Security Symposium. 2004.
  3. Moon, Hyungon, et al. "Vigilare: toward snoop-based kernel integrity monitor." Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012.
  4. Lee, Hojoon, et al. "KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object." USENIX Security. 2013 .
  5. Chen, Ping, et al. "DROP: Detecting return-oriented programming malicious code." Information Systems Security. Springer Berlin Heidelberg, 2009. 163-177.
  6. Kayaalp, Mehmet, et al. "SCRAP: Architecture for signature-based protection from code reuse attacks." High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on. IEEE, 2013.