메뉴 건너뛰기




Volumn , Issue , 2012, Pages

On state of the art in virtual machine security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; NETWORK SECURITY; VIRTUAL REALITY; VIRTUALIZATION;

EID: 84861488693     PISSN: 10910050     EISSN: 1558058X     Source Type: Conference Proceeding    
DOI: 10.1109/SECon.2012.6196905     Document Type: Conference Paper
Times cited : (2)

References (38)
  • 6
    • 85191956039 scopus 로고    scopus 로고
    • Nov
    • Java se at a glance. http://www.oracle.com/technetwork/java/javase/ overview/index.html[Nov2011].
    • (2011) Java Se at A Glance
  • 7
    • 85191977142 scopus 로고    scopus 로고
    • Nov
    • Hypercall xen wiki. http://wiki.xen.org/xenwiki/hypercall[Nov2011].
    • (2011) Hypercall Xen Wiki
  • 9
    • 50649096920 scopus 로고    scopus 로고
    • An empirical study into the security exposure to hosts of hostile virtualized environments
    • Tavis Ormandy. An empirical study into the security exposure to hosts of hostile virtualized environments. Test, pages 1-10, 2007.
    • (2007) Test , pp. 1-10
    • Ormandy, T.1
  • 10
    • 85191953661 scopus 로고    scopus 로고
    • Nov
    • Vmware vsphere for enterprise. http://www.vmware.com/products/vsphere/ overview.html[Nov2011].
    • (2011) Vmware Vsphere for Enterprise
  • 11
    • 85192022447 scopus 로고    scopus 로고
    • Jan
    • Using vmware: Understanding the virtual switch. http://www. virtualizationadmin.com/articles-tutorials/vmware-esx-and-vsphere-articles/ installation-deployment/vmware-understanding-virtual-switch.html[Jan2012].
    • (2012) Using Vmware: Understanding the Virtual Switch
  • 13
    • 78650734387 scopus 로고    scopus 로고
    • Virtual networking
    • December
    • S. Zhou. Virtual networking. SIGOPS Oper. Syst. Rev:44:80-85, December 2010.
    • (2010) SIGOPS Oper. Syst. Rev , vol.44 , pp. 80-85
    • Zhou, S.1
  • 16
    • 85191944154 scopus 로고    scopus 로고
    • Nov
    • Blue pill (software). http://en.wikipedia.org/wiki/Blue Pill (malware) [Nov2011].
    • (2011) Blue Pill (Software)
  • 17
    • 70849107663 scopus 로고    scopus 로고
    • Exploiting Live Virtual Machine Migration
    • Washington DC, February
    • Jon Oberheide, Evan Cooke, and Farnam Jahanian. Exploiting Live Virtual Machine Migration. In BlackHat DC Briefings, Washington DC, February 2008.
    • (2008) BlackHat DC Briefings
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 21
    • 85192012991 scopus 로고    scopus 로고
    • Nov
    • iscsi host platforms. http://www.netapp.com/us/products/protocols/ip-san/ [Nov2011].
    • (2011) Iscsi Host Platforms
  • 24
    • 23444440332 scopus 로고    scopus 로고
    • Trusted computing using amd "pacifica" and "presidio" secure virtual machine technology
    • January
    • Geoffrey Strongin. Trusted computing using amd "pacifica" and "presidio"secure virtual machine technology. Inf. Secur. Tech. Rep., 10:120-132, January 2005.
    • (2005) Inf. Secur. Tech. Rep. , vol.10 , pp. 120-132
    • Strongin, G.1
  • 28
    • 48649089771 scopus 로고    scopus 로고
    • Xen security modules (xsm)
    • George Coker. Xen security modules (xsm). Xen Summit, pages 1-33, 2006.
    • (2006) Xen Summit , pp. 1-33
    • Coker, G.1
  • 33
    • 54049106582 scopus 로고    scopus 로고
    • Virtual machine introspection: Observation or interference
    • September
    • Kara Nance, Matt Bishop, and Brian Hay. Virtual machine introspection: Observation or interference. IEEE Security and Privacy, 6:32-37, September 2008.
    • (2008) IEEE Security and Privacy , vol.6 , pp. 32-37
    • Nance, K.1    Bishop, M.2    Hay, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.