|
REFERENCES [1] W. A. Arbaugh, D. J. Farber, and J. M. Smith, “A secure and reliable bootstrap architecture,” In Proceedings of 1997 IEEE Symposium on Computer Security and Privacy, pp. 65-71, 1997. [2] J. Butler and G. Hoglund, “VICE—catch the hookers,” Black Hat USA, July 2004, http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf. [3] G. H. Kim and E. H. Spafford, “The design and implementation of Tripwire a file system integrity checker,” In Proceedings of 1994 ACM Conference on Computer and Communications Security (CCS), pp. 18-29, November 1994. [4] David A. Solomon & Mark E. Russionovich, Inside Windows 2000 (Microsoft Programming Series), 3rd Ed., Microsoft Press, September 2000. [5] Prasad Dabak, Milind Borate & Sandeep Phadke, Undocumented Windows NT, John Wiley & Sons, October 1999. [6] Sven B. Schreiber, Undocumented Windows 2000 Secrets: A Programmer's Cookbook, Addison-Wesley Pub Co, May 2001. [7]Gary Nebbett, Windows NT/2000 Native API Reference, New Riders Publishing, February 2000. [8] R. P. Goldberg, “Survey of virtual machine research,” IEEE Computer, pp. 34–45, June 1974. [9] D. Gollmann, Computer Security, 2nd edition. John Wiley and Sons, Inc., January 2006. [10] Halflife, “Abuse of the Linux kernel for fun and profit, ”Phrack, vol. 7, no. 50, April 1997. [11] J. S. Heidemann and G. J. Popek, “File-system development with stackable layers,” ACM Transactions on Computer Systems, vol. 12, no. 1, pp. 58-89, February 1994. [12] G. Hoglund and J. Butler, Rootkits: Subverting the Windows Kernel. Addison-Wesley, 2005. [13] A. Joshi, S. T. King, G. W. Dunlap, and P. M.Chen, “Detecting past and present intrusions through vulnerability-specific predicates,” In Proceedings of the 2005 Symposium on Operating Systems Principles (SOSP), pp. 91-104, October 2005. [14] J. Butler, J. L. Undercoffer, and J. Pinkston, “Hidden processes: The implication for intrusion detection,” In Proceedings of the 2003 Workshop on Information Assurance, pp. 116-121, June 2003. [15] S. T. King, G. W. Dunlap, and P. M. Chen, “Debugging operating systems with time-traveling virtual machines,” In Proceedings of the 2005 USENIX Technical Conference, pp. 1-15, April 2005. [16] G. J. Popek and R. P. Goldberg, “Formal requirements for virtualizable third generation architectures,” Communications of the ACM, vol. 17, no. 7, pp.412-421, July 1974. [17] J. Rutkowska, “Detecting windows server compromises,” In HivenCon Security Conference, November 2003, http://invisiblethings.org/papers/hivercon03_joanna.ppt. [18] Matt Pietrek, Windows95 System Programming Secrets, Hungry Minds, Inc, November 1995. [19] Walter Oney, Systems Programming for Windows 95 with Disk, July 1996. [20] Jeffrey Richter, Programming Applications for Microsoft Windows, 4th Ed., Microsoft Press, September 1999. [21] P. M. Chen and B. D. Noble, “When virtual is better than real,” In Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS), pp. 133–138, May 2001. [22] G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen, “ReVirt: Enabling intrusion analysis through virtual-machine logging and replay,” In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), pp. 211–224, December 2002. [23] Fuzen Op, “The fu rootkit,” http://www.rootkit.com/project.php?id=9. [24] R. Goldberg, “Architectural principles for virtual computer systems,” Ph.D. dissertation, Harvard University, February 1973. [25] MIL-STD-498, Software Development and Documentation, 1994. [26]尤焙麟 譯,駭客現形 — 網路安全之秘辛與解決方案,美商麥格羅希爾國際股份有限公司,2000年4月。 [27] Kenny H. 編著,網路系統 — 入侵與保護,長諾圖書,1999年1月。 [28]秘密客 著,對不起,駭到你,第三波資訊股份有限公司,2001年1月。
|