Hierarchical approach to analyzing security breaches in information systems
Tóm tắt
Từ khóa
Tài liệu tham khảo
Kaspersky Security Bulletin 2015. https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_ FINAL_EN.pdf.
Kasslin, K. and Lumpur, K., Kernel malware: The attack from within. http://nicolascormier.com/documentation/security/kasslin_kernel_malware_paper.pdf.
A Technical Breakdown of ModPOS. https://breakingmalware.com/malware/a-technical-breakdown-ofmodpos.
Zhang, X., van Doorn, L., Jaeger, T., Perez, R., and Sailer, R., Secure coprocessor-based intrusion detection, Proc. of the Tenth ACM SIGOPS European Workshop, 2002.
Petroni, N. and Fraser, T., Copilot–a coprocessor-based kernel runtime integrity monitor, Proc. of the 13th Conference on USENIX Security Symposium, 2004.
VMware vShield Endpoint. http://www.vmware.com/content/dam/digitalmarketing/vmware/ru/pdf/VMwarevShield-Endpoint-Datasheet.pdf.
Rutkowska, J., Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, 2006. http://blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.
Embleton, S., Sparks, S., and Zou, C., SMM rootkits: A new breed of OS independent malware, Proc. of the 4th International Conference on Security and Privacy in Communication Networks, 2008.
Nohl, K., Kribler, S., and Lell, J., BadUSB–On accessories that turn evil, Presented at Black Hat USA, 2014. https://srlabs.de/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf.
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., and Zhou, Y., Designing and implementation malicious hardware, Proc. of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats, 2008.
Becker, G.T., Regazzoni, F., Paar, C., and Burleson, W.P., International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2013, pp. 197–214.
Zammit, D., Intel x86s hide another CPU that can take over your machine. https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html.