Automated detection of persistent kernel control-flow attacks. Petroni & Hicks, M. In Proc. of the 14th ACM Conf. on Computer and Commun. Security, pages 103--115, 2007.
Paper doi bibtex @inproceedings{petronijr._automated_2007,
title = {Automated detection of persistent kernel control-flow attacks},
isbn = {978-1-59593-703-2},
url = {http://doi.acm.org/10.1145/1315245.1315260},
doi = {10.1145/1315245.1315260},
urldate = {2012-01-27TZ},
booktitle = {Proc. of the 14th {ACM} {Conf}. on {Computer} and {Commun}. {Security}},
author = {Petroni,Jr., Nick L. and Hicks, Michael},
year = {2007},
keywords = {CFI, integrity, kernel, rootkit, virtualization},
pages = {103--115}
}
Downloads: 0
{"_id":"iFGyiAhrTgEvuFbJ9","bibbaseid":"petroni-hicks-automateddetectionofpersistentkernelcontrolflowattacks-2007","downloads":0,"creationDate":"2016-10-15T13:23:23.739Z","title":"Automated detection of persistent kernel control-flow attacks","author_short":["Petroni","Hicks, M."],"year":2007,"bibtype":"inproceedings","biburl":"http://bibbase.org/zotero/pentarious","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Automated detection of persistent kernel control-flow attacks","isbn":"978-1-59593-703-2","url":"http://doi.acm.org/10.1145/1315245.1315260","doi":"10.1145/1315245.1315260","urldate":"2012-01-27TZ","booktitle":"Proc. of the 14th ACM Conf. on Computer and Commun. Security","author":[{"firstnames":[],"propositions":[],"lastnames":["Petroni"],"suffixes":["Jr.",",","Nick","L."]},{"propositions":[],"lastnames":["Hicks"],"firstnames":["Michael"],"suffixes":[]}],"year":"2007","keywords":"CFI, integrity, kernel, rootkit, virtualization","pages":"103--115","bibtex":"@inproceedings{petronijr._automated_2007,\n\ttitle = {Automated detection of persistent kernel control-flow attacks},\n\tisbn = {978-1-59593-703-2},\n\turl = {http://doi.acm.org/10.1145/1315245.1315260},\n\tdoi = {10.1145/1315245.1315260},\n\turldate = {2012-01-27TZ},\n\tbooktitle = {Proc. of the 14th {ACM} {Conf}. on {Computer} and {Commun}. {Security}},\n\tauthor = {Petroni,Jr., Nick L. and Hicks, Michael},\n\tyear = {2007},\n\tkeywords = {CFI, integrity, kernel, rootkit, virtualization},\n\tpages = {103--115}\n}\n\n","author_short":["Petroni","Hicks, M."],"key":"petronijr._automated_2007","id":"petronijr._automated_2007","bibbaseid":"petroni-hicks-automateddetectionofpersistentkernelcontrolflowattacks-2007","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/1315245.1315260"},"keyword":["CFI","integrity","kernel","rootkit","virtualization"],"downloads":0},"search_terms":["automated","detection","persistent","kernel","control","flow","attacks","petroni","hicks"],"keywords":["cfi","integrity","kernel","rootkit","virtualization"],"authorIDs":[],"dataSources":["QiRZ7m7shEMvADZkd"]}