2013
DOI: 10.1007/978-3-642-38631-2_15
|View full text |Cite
|
Sign up to set email alerts
|

X-TIER: Kernel Module Injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Process implanting (PI) [12], kernel-module injection (X-TIER) [34] and process hijacking (SYRINGE) [7] have been proposed in prior art as methods to perform introspection into the state of virtual machines. For such introspection to be secure, extra protection needs to be provided by the hypervisor to deny the runtime modification of the stack and heap data of the implanted code.…”
Section: Related Workmentioning
confidence: 99%
“…Process implanting (PI) [12], kernel-module injection (X-TIER) [34] and process hijacking (SYRINGE) [7] have been proposed in prior art as methods to perform introspection into the state of virtual machines. For such introspection to be secure, extra protection needs to be provided by the hypervisor to deny the runtime modification of the stack and heap data of the implanted code.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike the time point-based detection method, the periodbased detection method extends single detection to periodic detection. Such as X-TIER [9] proposed by Sebastian, it injects and removes a kernel module into TVM periodically. The injected module reads some kernel data structures to get TVM view.…”
Section: Related Workmentioning
confidence: 99%