A coprocessor-based introspection framework via intel management engine
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assisted approaches (e.g., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as rootkits. However, these approaches either require a large Trusted Computing Base (TCB) or...
Saved in:
Main Authors: | ZHOU, Lei, ZHANG, Fengwei, XIAO, Jidong, LEACH, Kevin, WEIMER, Westley, DING, Xuhua, WANG, Guojun |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6734 https://ink.library.smu.edu.sg/context/sis_research/article/7737/viewcontent/A_Coprocessor_Based_Introspection_Framework_Via_Intel_Management_Engine.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Hardware-assisted live kernel function updating on Intel platforms
by: ZHOU, Lei, et al.
Published: (2024) -
Catch you with cache: Out-of-VM introspection to trace malicious executions
by: SU, Chao, et al.
Published: (2021) -
Note on unawareness: Negative Introspection versus AU Introspection (and KU Introspection)
by: Chen, Y.-C., et al.
Published: (2014) -
Instructional software tool for the Intel 8086/8088 microprocessor
by: Buban, Melissa C., et al.
Published: (2000) -
Demystifying Intel ® Ivy bridge microarchitecture
by: Uy, Roger Luis
Published: (2013)