An Efficient Kernel Introspection System using a Secure Timer on TrustZone |
Kim, Jinmok
(Software R&D Center, Samsung Electronics)
Kim, Donguk (Software R&D Center, Samsung Electronics) Park, Jinbum (Software R&D Center, Samsung Electronics) Kim, Jihoon (Software R&D Center, Samsung Electronics) Kim, Hyoungshick (Sungkyunkwan University) |
1 | O.S. Hofmann, A.M. Dunn, Sangman Kim, I. Roy, and E.Witchel, "Ensuring operating system kernel integrity with OSck," Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, pp. 279-290, Mar. 2011 |
2 | Z. Wang, X. Jiang, W. Cui, and P. Ning, "Countering kernel rootkits with lightweight hook protection," Proceedings of the 16th ACM conference on Computer and communications security, pp. 545-554, Nov. 2009 |
3 | N.L. Petroni Jr., T. Fraser, J. Molina, and W. Arbaugh, W. A. "Copilot - a coprocessor-based kernel runtime integrity monitor," Proceedings of the 13th USENIX Security Symposium, pp. 179-194, Aug. 2004 |
4 | Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang, "Vigilare: toward snoop-based kernel integrity monitor," Proceedings of the 2012 ACM conference on Computer and communications security, pp. 28-37, Oct. 2012 |
5 | A.M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen, "Hypervision across worlds: real-time kernel protection from the ARM TrustZone secure world," Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 90-102, Nov. 2014 |
6 | X. Ge, H. Vijayakumar, and T. Jaeger, "Sprobes: enforcing kernel code integrity on the TrustZone architecture," Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014, May. 2014 |
7 | "Vmware : Vulnerability statistics," http://www.cvedetails.com/vendor/252/Vmware.html |
8 | "Xen : Security vulnerabilities," http://www.cvedetails.com/vulnerability-list/vendor_id-6276/XEN.html |
9 | "Sensepost," http://www.sensepost.com/blog/9114.html |
10 | "Unlocking the motorola bootloader," http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html |
11 | Sunjune Kong and Brent Byunghoon Kang, "Kernel introspection methods based on TrustZone," CISC-W'14, Dec. 2014 |
12 | "ARM TrustZone Software Architecture," http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/EABGFFIC.html |
13 | R. Riley, X. Jiang, D. Xu, "Multi-aspect profiling of kernel rootkit behavior," Proceedings of the 4th ACM European conference on Computer systems, pp. 47-60, Apr. 2009 |
14 | "Unix bench," https://code.google.com/p/byte-unixbench/ |
15 | "Linpack," http://www.netlib.org/benchmark/hpl/ |
16 | "CoreMark," http://www.eembc.org/coremark/download_coremark.php |
17 | "nbench," http://www.tux.org/-mayer/linux/bmark.html |