Acknowledgement
Supported by : 국방과학연구소
References
- Dmitri Alperovitch, Operation Aurora, Revealed: Operation Shady RAT
- Petroni Jr, Nick L., et al. "Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor." USENIX Security Symposium. 2004.
- Moon, Hyungon, et al. "Vigilare: toward snoop-based kernel integrity monitor." Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012.
- Lee, Hojoon, et al. "KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object." USENIX Security. 2013 .
- Chen, Ping, et al. "DROP: Detecting return-oriented programming malicious code." Information Systems Security. Springer Berlin Heidelberg, 2009. 163-177.
- Kayaalp, Mehmet, et al. "SCRAP: Architecture for signature-based protection from code reuse attacks." High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on. IEEE, 2013.