-
1
-
-
85080362568
-
A Virtual Machine Introspection-Based Architecture for Intrusion Detection
-
Internet Society
-
T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection-Based Architecture for Intrusion Detection," Proc. 10th Symp. Network, and Distributed System Security (NDSS 03), Internet Society, 2003, pp. 191-206.
-
(2003)
Proc. 10th Symp. Network, and Distributed System Security (NDSS 03)
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
4
-
-
77952336652
-
VMM-based Hidden Process Detection and Identification Using Lycosid
-
ACM Press
-
S. Joues, A. Arpaci-Dusseau, and R. Arpaci-Dusseau, "VMM-based Hidden Process Detection and Identification Using Lycosid," Proc. ACM Int'l Conf Virtual Execution Environments (VEE 08), ACM Press, 2008, pp. 91-100.
-
(2008)
Proc. ACM Int'l Conf Virtual Execution Environments (VEE 08)
, pp. 91-100
-
-
Joues, S.1
Arpaci-Dusseau, A.2
Arpaci-Dusseau, R.3
-
7
-
-
50249101677
-
Lares: An Architecture for Secure Active Monitoring Using Visualization
-
IEEE CS Press
-
B. Payne et al., "Lares: An Architecture for Secure Active Monitoring Using Visualization," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2008, pp. 233-247.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 233-247
-
-
Payne, B.1
-
8
-
-
34548013246
-
AntFarm: Tracking Processes in a Virtual Machine Environment
-
Usenix Assoc
-
S. Jones, A. Arpaci-Dusseau, and R. Arpaci-Dusseau, "AntFarm: Tracking Processes in a Virtual Machine Environment," Proc. Annual Usenix Tech. Conf., Usenix Assoc., 2008, pp. 1-14.
-
(2008)
Proc. Annual Usenix Tech. Conf
, pp. 1-14
-
-
Jones, S.1
Arpaci-Dusseau, A.2
Arpaci-Dusseau, R.3
-
9
-
-
84885639914
-
Detecting Past and Present Intrusions through Vulnerability-Specific Predicates
-
SOSP
-
A. Joshi et al., "Detecting Past and Present Intrusions through Vulnerability-Specific Predicates," Proc. Symp. Operating System Principles (SOSP), 2005, pp. 91-104.
-
(2005)
Proc. Symp. Operating System Principles
, pp. 91-104
-
-
Joshi, A.1
-
10
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
ACM Press
-
G.W. Duulap et al., "ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay," Proc. 2002 Symp. OS Design and Implementation (OSDI 02), ACM Press, 2002, pp. 211-224.
-
(2002)
Proc. 2002 Symp. OS Design and Implementation (OSDI 02)
, pp. 211-224
-
-
Duulap, G.W.1
-
11
-
-
85077373727
-
Debugging Operating Systems with Time-Traveling Virtual Machines
-
Usenix Assoc
-
S. King, G. Duulap, and P. Chen, "Debugging Operating Systems with Time-Traveling Virtual Machines," Proc. Annual Usenix Tech. Conf., Usenix Assoc., 2005; www.useuix.org/events/usenix05/tech/general/king/ kiug.pdf.
-
(2005)
Proc. Annual Usenix Tech. Conf
-
-
King, S.1
Duulap, G.2
Chen, P.3
-
12
-
-
54049127315
-
Forensics Examination of Volatile System Data Using Virtual Introspection
-
B. Hay and K. Nance, "Forensics Examination of Volatile System Data Using Virtual Introspection," ACM Sigops OS Review, vol. 42, no. 3, 2008, pp. 74-82.
-
(2008)
ACM Sigops OS Review
, vol.42
, Issue.3
, pp. 74-82
-
-
Hay, B.1
Nance, K.2
-
13
-
-
46649098260
-
Virtualization and Digital Forensics: A Research and Education Agenda
-
M. Pollitt et al., "Virtualization and Digital Forensics: A Research and Education Agenda," J. Digital Forensic Practice, vol. 2, no. 2, 2008, pp. 62-73.
-
(2008)
J. Digital Forensic Practice
, vol.2
, Issue.2
, pp. 62-73
-
-
Pollitt, M.1
|