Show simple item record

dc.contributor.authorLeon, Roee S
dc.contributor.authorKiperberg, Michael
dc.contributor.authorZabag, Anat Anatey Leon
dc.contributor.authorResh, Amit
dc.contributor.authorAlgawi, Asaf
dc.contributor.authorZaidenberg, Nezer J.
dc.date.accessioned2020-01-14T12:38:04Z
dc.date.available2020-01-14T12:38:04Z
dc.date.issued2019
dc.identifier.citationLeon, R. S., Kiperberg, M., Zabag, A. A. L., Resh, A., Algawi, A., & Zaidenberg, N. J. (2019). Hypervisor-Based White Listing of Executables. <i>IEEE Security & Privacy</i>, <i>17</i>(5), 58-67. <a href="https://doi.org/10.1109/MSEC.2019.2910218" target="_blank">https://doi.org/10.1109/MSEC.2019.2910218</a>
dc.identifier.otherCONVID_32967852
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67289
dc.description.abstractWe describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherIEEE Computer Society Press
dc.relation.ispartofseriesIEEE Security & Privacy
dc.rightsIn Copyright
dc.subject.otheroperating systems
dc.subject.otherdatabases
dc.subject.othervirtual machine monitors
dc.subject.otherLinux
dc.subject.othermicroprogramming
dc.subject.othermonitoring
dc.subject.otherimage segmentation
dc.titleHypervisor-Based White Listing of Executables
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202001141242
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange58-67
dc.relation.issn1540-7993
dc.relation.numberinseries5
dc.relation.volume17
dc.type.versionacceptedVersion
dc.rights.copyright© 2019 IEEE
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietoturva
dc.subject.ysovirtualisointi
dc.subject.ysoLinux
dc.subject.ysokäyttöjärjestelmät
dc.subject.ysoohjelmointi
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p22009
jyx.subject.urihttp://www.yso.fi/onto/yso/p723
jyx.subject.urihttp://www.yso.fi/onto/yso/p724
jyx.subject.urihttp://www.yso.fi/onto/yso/p4887
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1109/MSEC.2019.2910218
dc.type.okmA1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright