메뉴 건너뛰기




Volumn 6, Issue 5, 2008, Pages 32-37

Virtual machine introspection: Observation or interference?

Author keywords

[No Author keywords available]

Indexed keywords

EFFICIENT; MALWARE; MEMORY PAGES; SECURITY ENGINEERINGS; SYSTEM MONITORS; TOOL SUITES; VIRTUAL MACHINES;

EID: 54049106582     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.134     Document Type: Article
Times cited : (70)

References (13)
  • 7
    • 50249101677 scopus 로고    scopus 로고
    • Lares: An Architecture for Secure Active Monitoring Using Visualization
    • IEEE CS Press
    • B. Payne et al., "Lares: An Architecture for Secure Active Monitoring Using Visualization," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2008, pp. 233-247.
    • (2008) Proc. IEEE Symp. Security and Privacy , pp. 233-247
    • Payne, B.1
  • 9
    • 84885639914 scopus 로고    scopus 로고
    • Detecting Past and Present Intrusions through Vulnerability-Specific Predicates
    • SOSP
    • A. Joshi et al., "Detecting Past and Present Intrusions through Vulnerability-Specific Predicates," Proc. Symp. Operating System Principles (SOSP), 2005, pp. 91-104.
    • (2005) Proc. Symp. Operating System Principles , pp. 91-104
    • Joshi, A.1
  • 10
    • 84978401615 scopus 로고    scopus 로고
    • ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
    • ACM Press
    • G.W. Duulap et al., "ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay," Proc. 2002 Symp. OS Design and Implementation (OSDI 02), ACM Press, 2002, pp. 211-224.
    • (2002) Proc. 2002 Symp. OS Design and Implementation (OSDI 02) , pp. 211-224
    • Duulap, G.W.1
  • 11
    • 85077373727 scopus 로고    scopus 로고
    • Debugging Operating Systems with Time-Traveling Virtual Machines
    • Usenix Assoc
    • S. King, G. Duulap, and P. Chen, "Debugging Operating Systems with Time-Traveling Virtual Machines," Proc. Annual Usenix Tech. Conf., Usenix Assoc., 2005; www.useuix.org/events/usenix05/tech/general/king/ kiug.pdf.
    • (2005) Proc. Annual Usenix Tech. Conf
    • King, S.1    Duulap, G.2    Chen, P.3
  • 12
    • 54049127315 scopus 로고    scopus 로고
    • Forensics Examination of Volatile System Data Using Virtual Introspection
    • B. Hay and K. Nance, "Forensics Examination of Volatile System Data Using Virtual Introspection," ACM Sigops OS Review, vol. 42, no. 3, 2008, pp. 74-82.
    • (2008) ACM Sigops OS Review , vol.42 , Issue.3 , pp. 74-82
    • Hay, B.1    Nance, K.2
  • 13
    • 46649098260 scopus 로고    scopus 로고
    • Virtualization and Digital Forensics: A Research and Education Agenda
    • M. Pollitt et al., "Virtualization and Digital Forensics: A Research and Education Agenda," J. Digital Forensic Practice, vol. 2, no. 2, 2008, pp. 62-73.
    • (2008) J. Digital Forensic Practice , vol.2 , Issue.2 , pp. 62-73
    • Pollitt, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.