-
1
-
-
73549100005
-
The application of virtual machines on system security
-
Washington, DC, USA, IEEE Computer Society
-
Siqin Zhao, Kang Chen, and Weimin Zheng. The application of virtual machines on system security. In CHINAGRID '09: Proceedings of the 2009 Fourth ChinaGrid Annual Conference, pages 222-229, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
CHINAGRID '09: Proceedings of the 2009 Fourth ChinaGrid Annual Conference
, pp. 222-229
-
-
Zhao, S.1
Chen, K.2
Zheng, W.3
-
6
-
-
85191956039
-
-
Nov
-
Java se at a glance. http://www.oracle.com/technetwork/java/javase/ overview/index.html[Nov2011].
-
(2011)
Java Se at A Glance
-
-
-
7
-
-
85191977142
-
-
Nov
-
Hypercall xen wiki. http://wiki.xen.org/xenwiki/hypercall[Nov2011].
-
(2011)
Hypercall Xen Wiki
-
-
-
9
-
-
50649096920
-
An empirical study into the security exposure to hosts of hostile virtualized environments
-
Tavis Ormandy. An empirical study into the security exposure to hosts of hostile virtualized environments. Test, pages 1-10, 2007.
-
(2007)
Test
, pp. 1-10
-
-
Ormandy, T.1
-
10
-
-
85191953661
-
-
Nov
-
Vmware vsphere for enterprise. http://www.vmware.com/products/vsphere/ overview.html[Nov2011].
-
(2011)
Vmware Vsphere for Enterprise
-
-
-
11
-
-
85192022447
-
-
Jan
-
Using vmware: Understanding the virtual switch. http://www. virtualizationadmin.com/articles-tutorials/vmware-esx-and-vsphere-articles/ installation-deployment/vmware-understanding-virtual-switch.html[Jan2012].
-
(2012)
Using Vmware: Understanding the Virtual Switch
-
-
-
13
-
-
78650734387
-
Virtual networking
-
December
-
S. Zhou. Virtual networking. SIGOPS Oper. Syst. Rev:44:80-85, December 2010.
-
(2010)
SIGOPS Oper. Syst. Rev
, vol.44
, pp. 80-85
-
-
Zhou, S.1
-
16
-
-
85191944154
-
-
Nov
-
Blue pill (software). http://en.wikipedia.org/wiki/Blue Pill (malware) [Nov2011].
-
(2011)
Blue Pill (Software)
-
-
-
17
-
-
70849107663
-
Exploiting Live Virtual Machine Migration
-
Washington DC, February
-
Jon Oberheide, Evan Cooke, and Farnam Jahanian. Exploiting Live Virtual Machine Migration. In BlackHat DC Briefings, Washington DC, February 2008.
-
(2008)
BlackHat DC Briefings
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
19
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
New York, NY, USA, ACM
-
Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. Managing security of virtual machine images in a cloud environment. In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pages 91-96, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
21
-
-
85192012991
-
-
Nov
-
iscsi host platforms. http://www.netapp.com/us/products/protocols/ip-san/ [Nov2011].
-
(2011)
Iscsi Host Platforms
-
-
-
22
-
-
50249170138
-
Research on security of storage area network
-
New York, NY, USA, ACM
-
Zhang Xiao and Li Zhanhuai. Research on security of storage area network. In Proceedings of the 3rd international conference on Information security, InfoSecu '04, pages 238-239, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 3rd International Conference on Information Security, InfoSecu '04
, pp. 238-239
-
-
Zhang, X.1
Li, Z.2
-
23
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA, ACM
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
24
-
-
23444440332
-
Trusted computing using amd "pacifica" and "presidio" secure virtual machine technology
-
January
-
Geoffrey Strongin. Trusted computing using amd "pacifica" and "presidio"secure virtual machine technology. Inf. Secur. Tech. Rep., 10:120-132, January 2005.
-
(2005)
Inf. Secur. Tech. Rep.
, vol.10
, pp. 120-132
-
-
Strongin, G.1
-
25
-
-
33750248123
-
Building a mac-based security architecture for the xen open-source hypervisor
-
Washington, DC, USA, IEEE Computer Society
-
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin, and Leendert van Doorn. Building a mac-based security architecture for the xen open-source hypervisor. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 276-285, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
26
-
-
85192021402
-
-
Technical report, IBM
-
Trent Jaeger Ronald Perez Leendert van Doorn John Linwood Griffin Stefan Berger Reiner Sailer, Enriquillo Valdez. shype: Secure hypervisor approach to trusted virtualized systems. Technical report, IBM, 2005.
-
(2005)
Shype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
-
Jaeger, T.1
Perez, R.2
Van Doorn, L.3
Griffin, J.L.4
Berger, S.5
Sailer, R.6
Valdez, E.7
-
27
-
-
33846280529
-
Multi-level security requirements for hypervisors
-
Washington, DC, USA, IEEE Computer Society
-
Paul A. Karger. Multi-level security requirements for hypervisors. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 267-275, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 267-275
-
-
Karger, P.A.1
-
28
-
-
48649089771
-
Xen security modules (xsm)
-
George Coker. Xen security modules (xsm). Xen Summit, pages 1-33, 2006.
-
(2006)
Xen Summit
, pp. 1-33
-
-
Coker, G.1
-
29
-
-
80052992722
-
Verifying the safety of xen security modules
-
0
-
Wei Han, Yeping He, and Liping Ding. Verifying the safety of xen security modules. Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on, 0:30-34, 2011.
-
(2011)
Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on
, pp. 30-34
-
-
Han, W.1
He, Y.2
Ding, L.3
-
32
-
-
85192011411
-
-
Steve Muir, Larry Peterson, Marc Fiuczynski, Justin Cappos, and John Hartman. Proper: Privileged operations in a virtualised system environment. pages 50-56, 2005.
-
(2005)
Proper: Privileged Operations in A Virtualised System Environment
, pp. 50-56
-
-
Muir, S.1
Peterson, L.2
Fiuczynski, M.3
Cappos, J.4
Hartman, J.5
-
33
-
-
54049106582
-
Virtual machine introspection: Observation or interference
-
September
-
Kara Nance, Matt Bishop, and Brian Hay. Virtual machine introspection: Observation or interference. IEEE Security and Privacy, 6:32-37, September 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 32-37
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
35
-
-
67649851159
-
A formal security policy for xenon
-
New York, NY, USA, ACM
-
John McDermott and Leo Freitas. A formal security policy for xenon. In Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pages 43-52, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE '08
, pp. 43-52
-
-
McDermott, J.1
Freitas, L.2
-
37
-
-
34748834684
-
A novel approach for a file-system integrity monitor tool of xen virtual machine
-
New York, NY, USA, ACM
-
Nguyen Anh Quynh and Yoshiyasui Takefuji. A novel approach for a file-system integrity monitor tool of xen virtual machine. In Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS '07, pages 194-202, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 194-202
-
-
Quynh, N.A.1
Takefuji, Y.2
-
38
-
-
85191945273
-
A layered approach to simplified access control in virtualized systems
-
Bryan D. Payne, Ron Perez, Reiner Sailer, Wenke Lee, and Ramon Caceres. A layered approach to simplified access control in virtualized systems. Operating Systems Review, 41, 2007.
-
(2007)
Operating Systems Review
, vol.41
-
-
Payne, B.D.1
Perez, R.2
Sailer, R.3
Lee, W.4
Caceres, R.5
|