Hypervisor-Based White Listing of Executables
@article{Leon2019HypervisorBasedWL, title={Hypervisor-Based White Listing of Executables}, author={R. Leon and Michael Kiperberg and Anat Anatey Leon Zabag and A. Resh and Asaf Algawi and N. Zaidenberg}, journal={IEEE Security & Privacy}, year={2019}, volume={17}, pages={58-67} }
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible.
One Citation
References
SHOWING 1-10 OF 12 REFERENCES
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
- Computer Science
- 2006 IEEE Symposium on Security and Privacy (S&P'06)
- 2006
- 306
- PDF
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
- Computer Science
- RAID
- 2002
- 237
- PDF
Application whitelisting: Panacea or propaganda,
- SANS Institute. Accessed on: Mar
- 2018
Phoronix test suite,
- Access ed on: Mar
- 2018
Subverting Windows 7 x64 kernel with DMA attacks,
- in Proc. HITBSecConf,
- 2010