dc.contributor.author | Leon, Roee S | |
dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Zabag, Anat Anatey Leon | |
dc.contributor.author | Resh, Amit | |
dc.contributor.author | Algawi, Asaf | |
dc.contributor.author | Zaidenberg, Nezer J. | |
dc.date.accessioned | 2020-01-14T12:38:04Z | |
dc.date.available | 2020-01-14T12:38:04Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Leon, R. S., Kiperberg, M., Zabag, A. A. L., Resh, A., Algawi, A., & Zaidenberg, N. J. (2019). Hypervisor-Based White Listing of Executables. <i>IEEE Security & Privacy</i>, <i>17</i>(5), 58-67. <a href="https://doi.org/10.1109/MSEC.2019.2910218" target="_blank">https://doi.org/10.1109/MSEC.2019.2910218</a> | |
dc.identifier.other | CONVID_32967852 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67289 | |
dc.description.abstract | We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | IEEE Computer Society Press | |
dc.relation.ispartofseries | IEEE Security & Privacy | |
dc.rights | In Copyright | |
dc.subject.other | operating systems | |
dc.subject.other | databases | |
dc.subject.other | virtual machine monitors | |
dc.subject.other | Linux | |
dc.subject.other | microprogramming | |
dc.subject.other | monitoring | |
dc.subject.other | image segmentation | |
dc.title | Hypervisor-Based White Listing of Executables | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202001141242 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 58-67 | |
dc.relation.issn | 1540-7993 | |
dc.relation.numberinseries | 5 | |
dc.relation.volume | 17 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2019 IEEE | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoturva | |
dc.subject.yso | virtualisointi | |
dc.subject.yso | Linux | |
dc.subject.yso | käyttöjärjestelmät | |
dc.subject.yso | ohjelmointi | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22009 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p723 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p724 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4887 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1109/MSEC.2019.2910218 | |
dc.type.okm | A1 | |