-
1
-
-
77952283995
-
-
Retrieved August 10, 2007 from
-
Access Data. Retrieved August 10, 2007 from http://www.accessdata.com
-
-
-
-
6
-
-
77952263951
-
-
Retrieved November 15, 2007 from
-
Data Center Management Research Report September 2007. Retrieved November 15, 2007 from http://www.novell.com/products/zenworks/orchestrator/data-center- research-report-sep2007.pdf
-
Data Center Management Research Report September 2007
-
-
-
8
-
-
77952270236
-
-
Retrieved November 15, 2007 from
-
Grand Ideas Studio: Tribble. Retrieved November 15, 2007 from http://www.grandideastudio.com/src/portfolio.php?cat=&prod=14
-
Grand Ideas Studio: Tribble
-
-
-
9
-
-
77952274396
-
-
Retrieved August 10, 2007 from
-
Guidance Software, Inc. EnCase. Retrieved August 10, 2007 from http://www.guidancesoftware.com/
-
EnCase
-
-
-
11
-
-
34547941727
-
-
Retrieved November 15, 2007 from
-
Introducing Blue Pill. Retrieved November 15, 2007 from http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html
-
Introducing Blue Pill
-
-
-
12
-
-
77950853188
-
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
-
DOI=http://doi.acm.org/10.1145/1315245.1315262
-
Jiang, X., Wang, X., and Xu, D. 2007. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 28 - 31, 2007). CCS '07. ACM, New York, NY, 128-138. DOI=http://doi.acm.org/10.1145/1315245.1315262
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 28 - 31, 2007). CCS '07. ACM, New York, NY
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
13
-
-
77949635694
-
-
Retrieved November 18, 2007 from
-
Kernel based Virtual Machine. Retrieved November 18, 2007 from http://kvm.qumranet.com/kvmwiki.
-
Kernel Based Virtual Machine
-
-
-
14
-
-
32044466453
-
HyperSpector: Virtual distributed monitoring environments for secure intrusion detection
-
DOI 10.1145/1064979.1065006, Proceedings of the First ACM/USENIX International Conference on Virual Execution Environments, VEE 05
-
Kourai, K. and Chiba, S. 2005. HyperSpector: virtual distributed monitoring environments for secure intrusion detection. In Proceedings of the 1st ACM/USENIX international Conference on Virtual Execution Environments (Chicago, IL, USA, June 11 - 12, 2005). VEE '05. ACM, New York, NY, 197-207. DOI=http://doi.acm.org/10.1145/1064979.1065006 (Pubitemid 43195515)
-
(2005)
Proceedings of the First ACM/USENIX International Conference on Virual Execution Environments, VEE 05
, pp. 197-207
-
-
Kourai, K.1
Chiba, S.2
-
15
-
-
34547194202
-
Manitou: A layer-below approach to fighting malware
-
DOI=http://doi.acm.org/10.1145/1181309.1181311
-
Litty, L. and Lie, D. 2006. Manitou: a layer-below approach to fighting malware. In Proceedings of the 1st Workshop on Architectural and System Support For Improving Software Dependability (San Jose, California, October 21 - 21, 2006). ASID '06. ACM, New York, NY, 6-11. DOI=http://doi.acm.org/10.1145/ 1181309.1181311
-
(2006)
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability (San Jose, California, October 21 - 21, 2006). ASID '06. ACM, New York, NY
, pp. 6-11
-
-
Litty, L.1
Lie, D.2
-
16
-
-
77952256051
-
-
Retrieved July 15, 2007 from
-
Microsoft Virtual PC Server. Retrieved July 15, 2007 from http://www.microsoft.com/windows/products/wi
-
-
-
-
17
-
-
77952269387
-
-
Retrieved November 15, 2007 from
-
National Security Agency Central Security Service - Technology Profile Fact Sheet. Retrieved November 15, 2007 from http://www.nsa.gov/techtrans/ techt00011.cfm
-
-
-
-
18
-
-
77952261275
-
-
Retrieved July 25, 2007 from
-
Parallels. Retrieved July 25, 2007 from http://www.parallels.com/
-
-
-
-
19
-
-
77952278195
-
-
Retrieved November 15, 2007 from
-
ParavirtBenefits. Retrieved November 15, 2007 from http://virt. kernelnewbies.org/ParavirtBenefits
-
-
-
-
20
-
-
38349041413
-
A layered approach to simplified access control in virtualized systems
-
(Jul. 2007), DOI= http://doi.acm.org/10.1145/1278901.1278905
-
Payne, B. D., Sailer, R., Cáceres, R., Perez, R., and Lee, W. 2007. A layered approach to simplified access control in virtualized systems. SIGOPS Oper. Syst. Rev. 41, 4 (Jul. 2007), 12-19. DOI= http://doi.acm.org/10. 1145/1278901.1278905
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.4
, pp. 12-19
-
-
Payne, B.D.1
Sailer, R.2
Cáceres, R.3
Perez, R.4
Lee, W.5
-
21
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
DOI=http://doi.acm.org/10.1145/1315245.1315260
-
Petroni, N. L. and Hicks, M. 2007. Automated detection of persistent kernel control-flow attacks. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 28 - 31, 2007). CCS '07. ACM, New York, NY, 103-115. DOI=http://doi.acm.org/10.1145/ 1315245.1315260
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 28 - 31, 2007). CCS '07. ACM, New York, NY
, pp. 103-115
-
-
Petroni, N.L.1
Hicks, M.2
-
22
-
-
77952259756
-
-
Taylor & Francis, Philadelphia, PA. (in press)
-
Pollitt, M., Nance, K., Hay, B., Dodge, R., Craiger, P., Burke, P., Marberry, C., and Brubaker, B. Virtualization and Digital Forensics: A Research and Education Agenda in Journal of Digital Forensic Practice. Taylor & Francis, Philadelphia, PA. (in press)
-
Virtualization and Digital Forensics: A Research and Education Agenda in Journal of Digital Forensic Practice
-
-
Pollitt, M.1
Nance, K.2
Hay, B.3
Dodge, R.4
Craiger, P.5
Burke, P.6
Marberry, C.7
Brubaker, B.8
-
23
-
-
77952273938
-
-
Retrieved on November 18, 2007 from
-
QEMU. Open Source Process Emulator. Retrieved on November 18, 2007 from http://fabrice.bellard.free.fr/qemu/.
-
Open Source Process Emulator
-
-
-
24
-
-
35248835511
-
Towards a tamper-resistant kernel rootkit detector
-
DOI 10.1145/1244002.1244070, Proceedings of the 2007 ACM Symposium on Applied Computing
-
Quynh, N. A. and Takefuji, Y. 2007. Towards a tamperresistant kernel rootkit detector. In Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, March 11 - 15, 2007). SAC '07. ACM, New York, NY, 276-283. DOI= http://doi.acm.org/10.1145/1244002.1244070 (Pubitemid 47568299)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 276-283
-
-
Quynh, N.A.1
Takefuji, Y.2
-
25
-
-
77952271863
-
-
Retrieved November 15
-
Red Hat Enterprise Linux 5 - Virtualization. Retrieved November 15, 2007 from http://www.redhat.com/rhel/virtualization/
-
(2007)
-
-
-
26
-
-
85024276949
-
The Reincarnation of Virtual Machines
-
(Jul. 2004)
-
Rosenblum, M. 2004. The Reincarnation of Virtual Machines. Queue 2, 5 (Jul. 2004), 34-40.
-
(2004)
Queue
, vol.2
, Issue.5
, pp. 34-40
-
-
Rosenblum, M.1
-
27
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
DOI=http://doi.acm.org/10.1145/1294261.1294294
-
Seshadri, A., Luk, M., Qu, N., and Perrig, A. 2007. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles (Stevenson, Washington, USA, October 14 - 17, 2007). SOSP '07. ACM, New York, NY, 335-350. DOI=http://doi.acm.org/10.1145/1294261.1294294
-
(2007)
Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles (Stevenson, Washington, USA, October 14 - 17, 2007). SOSP '07. ACM, New York, NY
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
28
-
-
77952253567
-
-
Retrieved November 15, 2007 from
-
SLES 10 - Novell Virtualization Technology. Retrieved November 15, 2007 from http://www.novell.com/documentation/vmserver/pdfdoc/virtualization-basic/ virtualization-basics.pdf
-
-
-
-
29
-
-
77952283097
-
-
Retrieved November 15, 2007 from
-
UNIX man pages: ps. Retrieved November 15, 2007 from http://unixhelp.ed. ac.uk/CGI/man-cgi?ps
-
-
-
-
30
-
-
77952267270
-
-
Retrieved November 18, 2007 from
-
VMware. Retrieved November 18, 2007 from http://www.vmware.com.
-
-
-
-
31
-
-
77952285366
-
-
Retrieved November 15, 2007 from
-
VMware White Paper: Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Retrieved November 15, 2007 from http://www.vmware.com/files/pdf/VMware-paravirtualization.pdf
-
-
-
-
32
-
-
77952281492
-
-
Retrieved November 15, 2007 from
-
XenAccess Documentation. Retrieved November 15, 2007 from http://xenaccess.sourceforge.net/doc/index.html
-
-
-
-
33
-
-
77952259401
-
-
Retrieved July 27, 2007 from
-
Xensource. Retrieved July 27, 2007 from http://www.xensource.com/xen/xen/ nfamily/virtualpc/default.mspx
-
-
-
-
34
-
-
77952263742
-
-
Retrieved November 15, 2007 from
-
Xen: Mailing Lists. Retrieved November 15, 2007 from http://lists. xensource.com/
-
-
-
-
35
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
DOI= http://doi.acm.org/10.1145/1266840.1266852
-
Xu, M., Jiang, X., Sandhu, R., and Zhang, X. 2007. Towards a VMM-based usage control framework for OS kernel integrity protection. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20 - 22, 2007). SACMAT '07. ACM, New York, NY, 71-80. DOI= http://doi.acm.org/10.1145/1266840.1266852
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20 - 22, 2007). SACMAT '07. ACM, New York, NY
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
|