-
1
-
-
81855197755
-
-
website
-
InSight project website, https://code.google.com/p/insight-vmi/
-
InSight Project
-
-
-
2
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., Lee, W.: Virtuoso: Narrowing the semantic gap in virtual machine introspection. In: Proceedings of the IEEE Symposium on Security and Privacy (Oakland) (May 2011)
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland) (May 2011)
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
3
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. of NDSS, pp. 191-206 (2003)
-
(2003)
Proc. of NDSS
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
4
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
USENIX, Berkeley
-
Litty, L., Lagar-Cavilla, H.A., Lie, D.: Hypervisor support for identifying covertly executing binaries. In: Proc. of the 17th Conf. on Security Symp., pp. 243-258. USENIX, Berkeley (2008)
-
(2008)
Proc. of the 17th Conf. on Security Symp.
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
5
-
-
78249245404
-
Live and Trustworthy Forensic Analysis of Commodity Production Systems
-
Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
-
Martignoni, L., Fattori, A., Paleari, R., Cavallaro, L.: Live and Trustworthy Forensic Analysis of Commodity Production Systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 297-316. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6307
, pp. 297-316
-
-
Martignoni, L.1
Fattori, A.2
Paleari, R.3
Cavallaro, L.4
-
6
-
-
74049126468
-
A formal model for virtual machine introspection
-
Pfoh, J., Schneider, C., Eckert, C.: A formal model for virtual machine introspection. In: Proc. of 2nd Workshop on VM Sec. ACM, New York (2009)
-
Proc. of 2nd Workshop on VM Sec. ACM, New York (2009)
-
-
Pfoh, J.1
Schneider, C.2
Eckert, C.3
-
7
-
-
56549083677
-
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
8
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM
-
Wang, Z., Jiang, X., Cui, W., Ning, P.: Countering kernel rootkits with lightweight hook protection. In: Proc. of 16th Conf. on Computer and Communications Security, CCS 2009, pp. 545-554. ACM (2009)
-
(2009)
Proc. of 16th Conf. on Computer and Communications Security, CCS 2009
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|