-
1
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Barham, P., Dragovic, B., Fraser, K. et al.: Xen and the Art of Virtualization. In: Proc. of the 19th ACM Symp. on Operating Systems Principles 2003. pp.164-177. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
72349083366
-
Cloud Computing: Coming out of the fog
-
Huizenga, G.: Cloud Computing: Coming out of the fog. In: Proc. of the Linux Symposium 2008, Valume 1, pp. 197 - 210.
-
(2008)
Proc. of the Linux Symposium
, vol.1
, pp. 197-210
-
-
Huizenga, G.1
-
3
-
-
79951729418
-
-
http://aws.amazon.com/ec2/.
-
-
-
-
5
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Payne, B.D., Carbone, M., Sharif, M. and Lee, W.: Lares: An Architecture for Secure Active Monitoring Using Virtualization. In Proc. of the IEEE Symposium on Security and Privacy 2008, pp. 233-247.
-
(2008)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Garfinkel, T., Pfaff, B., et al.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. of the 19th ACM Symp. on Operating Systems Principles 2003, pp. 193 - 206. (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
51949119355
-
SHype: Secure Hypervisor approach to trusted virtualized systems
-
Feb.
-
Sailer, R., Valdez, E., Jaeger, T., et al.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Techn. Rep. RC23511, Feb. 2005. IBM Research Division.
-
(2005)
Techn. Rep. RC23511, IBM Research Division
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
-
9
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
Berger, S., Cceres, R., et al.: TVDc: managing security in the trusted virtual datacenter. In: ACM SIGOPS Operating Systems Review, Volume 42, Issue 1 (2008), pp. 40-47.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cceres, R.2
-
10
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
Hay, B., Nance, K.: Forensics Examination of Volatile System Data Using Virtual Introspection. In: OPERATING SYSTEMS REVIEW 2008, Vol 42 Number 3, pp.75-83.
-
(2008)
Operating Systems Review
, vol.42
, Issue.3
, pp. 75-83
-
-
Hay, B.1
Nance, K.2
-
11
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Payne, B., Carbone, M., Lee, W.: Secure and Flexible Monitoring of Virtual Machines. In: Computer Security Applications Conference 2007, pp. 385-397.
-
(2007)
Computer Security Applications Conference
, pp. 385-397
-
-
Payne, B.1
Carbone, M.2
Lee, W.3
-
13
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction
-
Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In: Proc. of the 14th ACM conference on Computer and Communications Security 2007, pp.128 - 138.
-
(2007)
Proc. of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
14
-
-
79951749659
-
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4993.
-
-
-
-
15
-
-
79951729810
-
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3253.
-
-
-
-
17
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. of the 13th conference on USENIX Security Symposium, 2004.
-
(2004)
Proc. of the 13th Conference on USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
18
-
-
79951734180
-
-
http://www.sans.org/readingroom/whitepapers/honors/linuxkernel-rootkits- protecting-systems1500.
-
-
-
-
19
-
-
85084162914
-
Copilot: A coprocessor-based kernel runtime integrity monitor
-
Petroni, N.L., Fraser, Jr. T., Molina, J., et al.: Copilot: a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th conference on USENIX Security Symposium, 2004.
-
(2004)
Proc. of the 13th Conference on USENIX Security Symposium
-
-
Petroni, N.L.1
Fraser, Jr.T.2
Molina, J.3
-
22
-
-
78149331563
-
The collective: A cache-based system management architecture
-
Chandra, R., Zeldovich, N., Sapuntzakis, C., S. Lam, M.: The collective: a cache-based system management architecture. In: Proc. of the 2nd conference on Symposium on Networked Systems Design and Implementation 2005, Vol.2, pp. 259-272.
-
(2005)
Proc. of the 2nd Conference on Symposium on Networked Systems Design and Implementation
, vol.2
, pp. 259-272
-
-
Chandra, R.1
Zeldovich, N.2
Sapuntzakis, C.3
S. Lam, M.4
-
25
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
Sharif, M., Lee, W., Cui, W., et al.: Secure In-VM Monitoring Using Hardware Virtualization. In: Proc. of the 16th ACM conference on Computer and Communications Security 2009, pp.477-487.
-
(2009)
Proc. of the 16th ACM Conference on Computer and Communications Security
, pp. 477-487
-
-
Sharif, M.1
Lee, W.2
Cui, W.3
|