ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay (2002)

by George W. Dunlap , Samuel T. King , Sukru Cinar , Murtaza A. Basrai , Peter M. Chen
Venue:In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI
Citations:341 - 19 self

Documents Related by Co-Citation

238 A Virtual Machine Introspection Based Architecture for Intrusion Detection – Tal Garfinkel, Mendel Rosenblum - 2003
262 Secure Execution Via Program Shepherding – Vladimir Kiriansky , Derek Bruening, Saman Amarasinghe - 2002
218 Scale and performance in the Denali isolation kernel – Andrew Whitaker, Marianne Shaw, Steven D. Gribble - 2002
208 Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor – Jeremy Sugerman, Ganesh Venkitachalam, BengHong Lim - 2001
211 Hypervisor-based fault tolerance – Thomas C. Bressoud, Fred B. Schneider - 1995
1251 Xen and the art of virtualization – Paul Barham, Boris Dragovic, Keir Fraser, Steven H, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
60 Operating System Support for Virtual Machines – Samuel T. King, et al.
172 A ”flight data recorder” for enabling full-system multiprocessor deterministic replay – M Xu, R Bodík, M D Hill - 2003
149 Using Programmer-Written Compiler Extensions to Catch Security Holes – Ken Ashcraft, et al.
210 Survey of Virtual Machine Research – Robert R Goldberg - 1974
33 Nettop - commercial technology in high assurance applications, 2000. http: // – R Meushaw, D Simard
467 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
310 Memory resource management in vmware esx server – Carl A. Waldspurger - 2002
65 Replay for concurrent nondeterministic shared memory applications – M Russinovich, B Cogswell - 1996
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
281 Insertion, evasion, and denial of service: Eluding network intrusion detection – Thomas H. Ptacek, Timothy N. Newsham - 1998
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
484 How to 0wn the Internet in Your Spare Time – Stuart Staniford, Vern Paxson, Nicholas Weaver - 2002
377 B.Werne, Simics: A Full System Simulation Platform – P Magnusson, M Christensson, J Eskilson, D Forsgren, G Hallberg, J Haogberg, F Larsson, A Moestedt