-
1
-
-
84889643939
-
Are Virtual Machine Monitors Microkernels Done Right?
-
Hand, S., Warfield, A., Fraser, K., Kotsovinos, E., Magenheimer, D.: Are Virtual Machine Monitors Microkernels Done Right? In: Proceedings of the Tenth Workshop on Hot Topics in Operating Systems (HotOS-X) (June 2005)
-
(2005)
Proceedings of the Tenth Workshop on Hot Topics in Operating Systems (HotOS-X) (June
-
-
Hand, S.1
Warfield, A.2
Fraser, K.3
Kotsovinos, E.4
Magenheimer, D.5
-
2
-
-
33947574485
-
Virtualization: Old Technology Offers Huge New Potential
-
Goth, G.: Virtualization: Old Technology Offers Huge New Potential. IEEE Distributed Systems Online 8(2) (2007)
-
(2007)
IEEE Distributed Systems Online
, vol.8
, Issue.2
-
-
Goth, G.1
-
3
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Software Eng. 17(11), 1147-1165 (1991)
-
(1991)
IEEE Trans. Software Eng
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
4
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Software Eng. 17(11), 1147-1165 (1991)
-
(1991)
IEEE Trans. Software Eng
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
6
-
-
21644433634
-
Xen and the art of virtualization
-
NY October
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003. Proceedings of the 19th Symposium on Operating System Principles, Bolton Landing, NY (October 2003)
-
(2003)
SOSP 2003. Proceedings of the 19th Symposium on Operating System Principles, Bolton Landing
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
9
-
-
77950583783
-
Centralized Security Policy Support for Virtual Machine
-
Quynh, N.A., Ando, R., Takefuji, Y.: Centralized Security Policy Support for Virtual Machine. In: LISA 2007. Proceedings of USENIX, 20th Large Installation System Administration Conference (December 2006)
-
(2006)
LISA 2007. Proceedings of USENIX, 20th Large Installation System Administration Conference (December
-
-
Quynh, N.A.1
Ando, R.2
Takefuji, Y.3
-
10
-
-
38148998961
-
-
Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doom, L.: Building a MAC-Based Security Architecture for the Xen Opensource Hypervisor. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, 3740, Springer, Heidelberg (2005)
-
Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doom, L.: Building a MAC-Based Security Architecture for the Xen Opensource Hypervisor. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol. 3740, Springer, Heidelberg (2005)
-
-
-
-
11
-
-
52649086050
-
ReTrace: Collecting Execution Trace with Virtual Machine Deterministic Replay
-
Xu, M., Malyugin, V., Sheldon, J., Venkitachalam, G., Weissman, B.: ReTrace: Collecting Execution Trace with Virtual Machine Deterministic Replay. In: MoBS 2007. Proceedings of Third Annual Workshop on Modeling, Benchmarking and Simulation (June 2007)
-
(2007)
MoBS 2007. Proceedings of Third Annual Workshop on Modeling, Benchmarking and Simulation (June
-
-
Xu, M.1
Malyugin, V.2
Sheldon, J.3
Venkitachalam, G.4
Weissman, B.5
-
12
-
-
33745956039
-
Framework for Instruction-level Tracing and Analysis of Programs
-
Bhansali, S., Chen, W.-K., De Jong, S., Edwards, A., Drinic, M.: Framework for Instruction-level Tracing and Analysis of Programs. In: VEE 2006. Proceedings of Second International Conference on Virtual Execution Environments (June 2006)
-
(2006)
VEE 2006. Proceedings of Second International Conference on Virtual Execution Environments (June
-
-
Bhansali, S.1
Chen, W.-K.2
De Jong, S.3
Edwards, A.4
Drinic, M.5
-
13
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G.W., King, S.T., Cinar, S., Basrai, M., Chen, P.M.: ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In: OSDI 2002. Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (December 2002)
-
(2002)
OSDI 2002. Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (December
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
14
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: Proceedings of IEEE Symp. on Security and Privacy (the Oakland Conference) (May 2006)
-
(2006)
Proceedings of IEEE Symp. on Security and Privacy (the Oakland Conference) (May
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
16
-
-
20344391930
-
Intel Virtualization Technology
-
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C.M., Anderson, A.V., Bennett, S.M., Kagi, A., Leung, F.H., Smith, L.: Intel Virtualization Technology. IEEE Computer 38(5), 48-56 (2005)
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
|