-
6
-
-
21644433634
-
Xen and the Art of Virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
85084164812
-
Collapsar: A VM-Based Architecture for Network Attack Detention Center
-
Aug
-
X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. In Proceedings of 13th USENIX Security Symposium, Aug. 2004.
-
(2004)
Proceedings of 13th USENIX Security Symposium
-
-
Jiang, X.1
Xu, D.2
-
10
-
-
33751032041
-
SubVirt: Implementing Malware with Virtual Machines
-
May
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing Malware with Virtual Machines. In Proceedings of the IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
King, S. T.1
Chen, P. M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H. J.5
Lorch, J. R.6
-
12
-
-
84885044461
-
-
Microsoft. Windows Hardware Developer Central, October 20
-
Microsoft. CPU Virtualization Extensions: Analysis of Rootkit Issues. http://www.microsoft.com/whdc/system/platform/virtual/CPUVirtExt.mspx. Windows Hardware Developer Central, October 20, 2006.
-
(2006)
CPU Virtualization Extensions: Analysis of Rootkit Issues
-
-
-
13
-
-
33846483949
-
Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization
-
Aug
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10(3), Aug. 2006.
-
(2006)
Intel Technology Journal
, vol.10
, Issue.3
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
15
-
-
85084161596
-
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor
-
Aug
-
J. Robin and C. Irvine. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. In Proceedings of the 9th USENIX Security Symposium, Aug. 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Robin, J.1
Irvine, C.2
-
16
-
-
0029512781
-
Complete computer system simulation: The SimOS approach
-
Winter
-
M. Rosenblum, S. A. Herrod, E. Witchel, and A. Gupta. Complete computer system simulation: The SimOS approach. IEEE Parallel and Distributed Technology: Systems and Applications, 3(4):34-43, Winter 1995.
-
(1995)
IEEE Parallel and Distributed Technology: Systems and Applications
, vol.3
, Issue.4
, pp. 34-43
-
-
Rosenblum, M.1
Herrod, S. A.2
Witchel, E.3
Gupta, A.4
-
19
-
-
33750376717
-
Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm
-
Oct
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, G. M. Voelker, and S. Savage. Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, Oct. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A. C.6
Voelker, G. M.7
Savage, S.8
-
21
-
-
33750356750
-
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
Feb
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, Feb. 2006.
-
(2006)
Proceedings of Network and Distributed Systems Security Symposium
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S. T.7
|