2011 IEEE Symposium on Intelligent Agent (IA) 2011
DOI: 10.1109/ia.2011.5953619
|View full text |Cite
|
Sign up to set email alerts
|

A Pre-Kernel Agent Platform for security assurance

Abstract: Abstract-Without the security assurance from the underlining operating system, software agents and agencies are constantly under security threats through the operating system. Although the security issues between software agents and agencies have been studied intensively, any formulated counter-measurement of these issues are subject to attacks that are able to exploit the vulnerabilities of the operating system kernel (OS kernel). To protect agents and agencies against such risks, we proposed a novel approach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Security Agent Injection. Closely related to HyperForce is work by Lee et al [11] and Chiueh et al [4] on deploying agents by means of code injection from a hypervisor. Both approaches are applicable to guest OSs that have not been previously prepared by loading a special driver or similar.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security Agent Injection. Closely related to HyperForce is work by Lee et al [11] and Chiueh et al [4] on deploying agents by means of code injection from a hypervisor. Both approaches are applicable to guest OSs that have not been previously prepared by loading a special driver or similar.…”
Section: Related Workmentioning
confidence: 99%
“…Both approaches are applicable to guest OSs that have not been previously prepared by loading a special driver or similar. In [11], Lee et al proposes to protect agent code that is executing in a compromised guest OS kernel by the use of cryptography and by injecting this code on demand from the hypervisor. As there is no implementation and no experimental evaluation given, a comparison with HyperForce is not feasible.…”
Section: Related Workmentioning
confidence: 99%