-
The 2010 IEEE Symposium on Security and Privacy
[Malware Analysis]
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
C. Kolbitsch (*), T. Holz (*), C. Kruegel (**), E. Kirda (***)
* Vienna University of Technology, ** University of California, Santa Barbara, *** Institute Eurecom
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
M. Fredrikson (*), M. Christodorescu (**), S. Jha (*), R. Sailer (**), X. Yan (***)
* University of Wisconsin, ** IBM Research, *** University of California, Santa Barbara
Identifying Dormant Functionality in Malware Programs
P. Comparetti (*), G. Salvaneschi (**), C. Kolbitsch (*), E. Kirda (***), C. Kruegel (****), S. Zanero (**)
* Technical University Vienna, ** Politecnico di Milano, *** Institut Eurecom, **** University of California, Santa Barbara
[Secure Systems]
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
J. Franklin (*), S. Chaki (*), A. Datta (*), A. Seshadri (**)
* Carnegie Mellon University, ** IBM Research
-
The 22st ACM Symposium on Operating Systems Principles
[Device Drivers]
Fast Byte-granularity Software Fault Isolation
M. Castro (*), M. Costa (*), J.P. Martin (*), M. Peinado (*), P. Akritidis (*, **), A. Donnelly (*), P. Barham (*), and R. Black (*)
* Microsoft Research, ** Cambridge University
Tolerating Hardware Device Failures in Software
A. Kadav, M. Renzelmann, and M. Swift
University of Wisconsin-Madison
[Debugging]
Automatically Patching Errors in Deployed Software
J. Perkins (*), S. Kim (**), S. Larsen (***), S. Amarasinghe (*), J. Bachrach (*), M. Carbin (*), C. Pacheco (****), F. Sherwood, S. Sidiroglou (*), G. Sullivan (*****), W. Wong (******), Y. Zibin (*******), M. Ernst (********), and M. Rinard (*)
* MIT, ** HKUST, *** VMware, Inc, **** BCG ***** BAE AIT, ****** NUS, ******* Come2Play, ******** U. of Washington
[I/O]
Operating Systems Transactions
D. Porter, O. Hofmann, C. Rossbach, A. Benn, and E. Witchel
The University of Texas at Austin
[Kernels]
seL4: Formal Verification of an OS Kernel
G. Klein (*, **), K. Elphinstone (*, **), G. Heiser (*, **, ***), J. Andronick (*), D. Cock (*), P. Derrin (*), D. Elkaduwe (*, **, ****), K. Engelhardt (*, **), M. Norrish (*, *****), R. Kolanski (*, **), T. Sewell (*), H. Tuch (*, **), and S. Winwood (*, **)
* NICTA, ** UNSW, *** Open Kernel Labs, **** University of Peradeniya, ***** ANU
Surviving Sensor Network Software Faults
Y. Chen (*), O. Gnawali (**), M. Kazandjieva (***), P. Levis (***), and J. Regehr (*)
* University of Utah, ** USC, *** Stanford University
-
The 18th USENIX Security Symposium
[Malware Detection and Protection]
Effective and Efficient Malware Detection at the End Host
C. Kolbitsch (*), P. Comparetti (*), C. Kruegel (**), E. Kirda (***), X. Zhau (****), and X. Wang (****)
* TU Vienna, ** UC Santa Barbara, *** Institute Eurecom, Sophia Antipolis, Indiana University at Bloomington
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanism
R. Hund, T. Holz, and F. Freiling
University of Mannheim
-
The 4th European Conference on Computer Systems
[Defending against Bad Things]
Orchestra: Intrusion Detection Using Parallel Execution
and Monitoring of Program Variants in User-Space
B. Salamat, T. Jackson, A. Gal, and M. Franz
University of California
[Real, Running Systems]
First-Aid: Surviving and Preventing Memory Management Bugs
during Production Runs
Q. Gao, W. Zhang, Y. Tang, and F. Qin
Ohio State University
-
The 16th Annual Network and Distributed System Security
Symposium
[Host Security]
IntScope: Automatically Detecting Integer Overflow
Vulnerability in X86 Binary Using Symbolic Execution
T. Wang (*), T. Wei (*), Z. Lin (**), and W. Zou (*)
* Peking University, ** Purdue University
-
The 8th USENIX Symposium on Operating Systems Design and Implementation
[OS Architecture]
CuriOS: Improving Reliability through Operating System Structure
F. David, E. Chan, J. Carlyle, and R. Campbell
University of Illinois
[Security]
Hardware Enforcement of Application Security Policies Using
Tagged Memory
N. Zeldovich (*), H. Kannan (**), M. Dalton (**), and
C. Kozyrakis(**)
* MIT, ** Stanford University
Device Driver Safety Through a Reference Validation Mechanism
D. Williams, P. Reynolds, K. Walsh, E. Sirer, and F. Schneider
Cornell University
[Various Good Things]
Leveraging Legacy Code to Deploy Desktop Applications on the Web
J. Douceur, J. Elson, J. Howell, and J. Lorch
Microsoft Research
-
The 1st USENIX Workshop on Offensive Technologies
[From the Metal to the Infrastructure]
-
The 4th USENIX Symposium on Networked Systems Design and
Implementation
[Tolerating Faults and Misbehavior]
TightLip: Keeping Applications from Spilling the Beans
A. Yumerefendi, B. Mickle, and L. Cox
Duke University