Hypervisor-Based White Listing of Executables

@article{Leon2019HypervisorBasedWL,
  title={Hypervisor-Based White Listing of Executables},
  author={R. Leon and Michael Kiperberg and Anat Anatey Leon Zabag and A. Resh and Asaf Algawi and N. Zaidenberg},
  journal={IEEE Security & Privacy},
  year={2019},
  volume={17},
  pages={58-67}
}
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. 
1 Citations

Figures and Topics from this paper

References

SHOWING 1-10 OF 12 REFERENCES
Feature: The promise of whitelisting
  • 11
Application Whitelisting: Approaches and Challenges
  • 14
  • PDF
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
  • 306
  • PDF
A Survey of Malware Detection Techniques
  • 336
  • PDF
Application whitelisting: Panacea or propaganda,
  • SANS Institute. Accessed on: Mar
  • 2018
Phoronix test suite,
  • Access ed on: Mar
  • 2018
Subverting Windows 7 x64 kernel with DMA attacks,
  • in Proc. HITBSecConf,
  • 2010
...
1
2
...