-
2
-
-
20344389520
-
The Architecture of Virtual Machines
-
J. E. Smith and R. Nair, "The Architecture of Virtual Machines", IEEE Computer, Vol.38, No.5, pp.32-38, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 32-38
-
-
Smith, J.E.1
Nair, R.2
-
3
-
-
20344383743
-
Virtual Machine Monitors: Current Technology and Future Trends
-
M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends", IEEE Computer, Vol.38, No.5, pp.39-47, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
4
-
-
21644433634
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. H. T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization", In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp.164-177, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Harris, S.H.T.4
Ho, A.5
Neugebauer, R.6
Pratt, I.7
Warfield, A.8
-
5
-
-
85091115835
-
Xen and the Art of Repeated Research
-
B. Clark, T. Deshane, E. Dow, S. Evanchik, M. Finlayson, J. Herne, and J. N. Matthews, "Xen and the Art of Repeated Research", In Proceedings of the 2004 USENIX Annual Technical Conference, pp.135-144, 2004.
-
(2004)
Proceedings of the 2004 USENIX Annual Technical Conference
, pp. 135-144
-
-
Clark, B.1
Deshane, T.2
Dow, E.3
Evanchik, S.4
Finlayson, M.5
Herne, J.6
Matthews, J.N.7
-
6
-
-
34548088028
-
Xen 3.0 and the Art of Virtualization
-
I. Pratt, K. Fraser, S. Hand, C. Limpach, A. Warfield, D. Magenheimer, J. Nakajima, and A. Mallick, "Xen 3.0 and the Art of Virtualization", In Proceedings of the 2005 Linux Symposium, pp.65-77, 2005.
-
(2005)
Proceedings of the 2005 Linux Symposium
, pp. 65-77
-
-
Pratt, I.1
Fraser, K.2
Hand, S.3
Limpach, C.4
Warfield, A.5
Magenheimer, D.6
Nakajima, J.7
Mallick, A.8
-
9
-
-
77952336652
-
VMM-based Hidden Process Detection and Identification using Lycosid
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "VMM-based Hidden Process Detection and Identification using Lycosid", In Proceedings of the 4th ACM/USENIX International Conference on Virtual Execution Environments, pp.91-100, 2008.
-
(2008)
Proceedings of the 4th ACM/USENIX International Conference on Virtual Execution Environments
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
10
-
-
77950853188
-
Stealthy Malware Detection through VMM-Based Out-of-the-Box Semantic View Reconstruction
-
X. Jiang, X. Wang, and D. Xu, "Stealthy Malware Detection through VMM-Based Out-of-the-Box Semantic View Reconstruction", In Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.128-138, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
11
-
-
70349240080
-
Ether: Malware Analysis via Hardware Virtualization Extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: Malware Analysis via Hardware Virtualization Extensions", In Proceedings of the 15th ACM Conference on Computer and Communications Security, pp.51-62, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
13
-
-
76649114635
-
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments
-
C. Xuan, J. Copeland, and R. Beyah, "Toward Revealing Kernel Malware Behavior in Virtual Execution Environments", In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, pp.304-325, 2009.
-
(2009)
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 304-325
-
-
Xuan, C.1
Copeland, J.2
Beyah, R.3
-
14
-
-
50249101677
-
Lares: An Architecture for Secure Active Monitoring Using Virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An Architecture for Secure Active Monitoring Using Virtualization", In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp.233-247, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
16
-
-
78650539928
-
-
Virtual PC homepage, http://www.microsoft.-com/windows/virtualpc/
-
Virtual PC Homepage
-
-
-
17
-
-
78650554195
-
-
VMsafe homepage, http://www.vmware.com/technicalresourcces/security/ vmsafe.html.
-
VMsafe Homepage
-
-
-
18
-
-
48649085344
-
Secure and Flexible Monitoring of Virtual Machines
-
B. D. Payne, M. D. P. A. Carbone, and W. Lee, "Secure and Flexible Monitoring of Virtual Machines", In Proceedings of the 23rd Annual Computer Security Applications Conference, pp.385-397, 2007.
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference
, pp. 385-397
-
-
Payne, B.D.1
Carbone, M.D.P.A.2
Lee, W.3
-
22
-
-
0032313923
-
Intrusion Detection using Sequences of System Calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection using Sequences of System Calls", Journal of Computer Security, Vol.6, No.3, pp.151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
23
-
-
78650555123
-
-
Adore-ng
-
Adore-ng, http://lwn.net/Articles/75991/
-
-
-
-
24
-
-
78650536984
-
-
FU
-
FU, http://rapiddigger.com/search/download-fu-rootkit/
-
-
-
|