-
2
-
-
50249161764
-
-
Advanced Micro Devices. Amd64 architecture programmer's manual 2: System programming, 2007.
-
Advanced Micro Devices. Amd64 architecture programmer's manual volume 2: System programming, 2007.
-
-
-
-
5
-
-
50249137507
-
-
G. Coker. Xen security modules (XSM). Presented at the 2007 Xen Summit.
-
G. Coker. Xen security modules (XSM). Presented at the 2007 Xen Summit.
-
-
-
-
6
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the Symposium on Operating Systems Design and Implementation, 2002.
-
(2002)
Proceedings of the Symposium on Operating Systems Design and Implementation
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
7
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos, CA, USA
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, 1994.
-
(1994)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
8
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
17
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
28
-
-
0020273088
-
Proof of separability: A verification technique for a class of security kernels
-
April
-
J. M. Rushby. Proof of separability: A verification technique for a class of security kernels. Lecture Notes in Computer Science, 137:352-357, April 1982.
-
(1982)
Lecture Notes in Computer Science
, vol.137
, pp. 352-357
-
-
Rushby, J.M.1
-
31
-
-
33750248123
-
Building a mac-based security architecture for the xen opensource hypervisor
-
December
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a mac-based security architecture for the xen opensource hypervisor. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), December 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
van Doorn, L.8
-
33
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles, 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
40
-
-
77950788046
-
Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Capturing system-wide information flow for malware detection and analysis. In Proceedings of the ACM Conference of Computer and Communication Security, 2007.
-
(2007)
Proceedings of the ACM Conference of Computer and Communication Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|