-
1
-
-
21644433634
-
Xen and the art of virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pages 164-177, Oct 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th A CM Symposium on Operating Systems Principles (SOSP 2003), Oct. 2003.
-
(2003)
Proceedings of the 19th A CM Symposium on Operating Systems Principles (SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
4
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11):1147-1165, 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
6
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
May
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. Subvirt: Implementing malware with virtual machines. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
7
-
-
84879157346
-
The Windows malicious software removal tool: Progress made, trends observed
-
Microsoft Antimalware Team, Technical report, Microsoft, June 2006
-
Microsoft Antimalware Team. The Windows malicious software removal tool: Progress made, trends observed. Technical report, Microsoft, June 2006.
-
-
-
-
9
-
-
34547157819
-
-
R. Naraine. Microsoft says recovery from malware becoming impossible, 2006. www.eweek.com/article2/0,1895,1945808,00.asp
-
R. Naraine. Microsoft says recovery from malware becoming impossible, 2006. www.eweek.com/article2/0,1895,1945808,00.asp
-
-
-
-
10
-
-
85084162914
-
Copilot - a coprocessor-based kernel runtime integrity monitor
-
Aug
-
N. L. Petroni Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium, pages 179-194, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
11
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223-238, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
13
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
Sept
-
X. Zhang, L. van Doom, T. Jaeger, R. Perez, and R. Sailer. Secure coprocessor-based intrusion detection. In Proceedings of the 10th ACM SIGOPS European Workshop, Sept. 2002.
-
(2002)
Proceedings of the 10th ACM SIGOPS European Workshop
-
-
Zhang, X.1
van Doom, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|