메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1807-1814

Detecting malware signatures in a thin hypervisor

Author keywords

hypervisors; malware; virtual machine monitors

Indexed keywords

HYPERVISOR; HYPERVISORS; MALWARE DETECTION; MALWARES; VIRTUAL MACHINE MONITORS;

EID: 84863577442     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2245276.2232070     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 1
    • 0016518897 scopus 로고
    • Efficient String Matching: An Aid to Bibliographic Search
    • A. V. Aho and M. J. Corasick. Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM, 18(6):333-340, 1975.
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 2
    • 80053150585 scopus 로고    scopus 로고
    • BitLocker Drive Encryption. http://windows.microsoft.com/en-US/windows7/ products/features/bitlocker.
    • BitLocker Drive Encryption
  • 6
    • 68249140232 scopus 로고    scopus 로고
    • TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems
    • M. Hanaoka, M. Shimamura, and K. Kono. TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems. IEICE Transactions on Information and Systems, E90-D(12):2019-2032, 2007.
    • (2007) IEICE Transactions on Information and Systems , vol.E90-D , Issue.12 , pp. 2019-2032
    • Hanaoka, M.1    Shimamura, M.2    Kono, K.3
  • 7
    • 77949441598 scopus 로고    scopus 로고
    • Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction
    • X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. ACM Transactions on Information and System Security, 13(2):12:1-12:28, 2010.
    • (2010) ACM Transactions on Information and System Security , vol.13 , Issue.2
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 8
    • 84863599055 scopus 로고    scopus 로고
    • LMbench. http://www.bitmover.com/lmbench/.
    • LMbench
  • 13
    • 56549083677 scopus 로고    scopus 로고
    • Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing
    • Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008)
    • R. Riley, X. Jiang, and D. Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), volume 5230 of Lecture Notes in Computer Science, pages 1-20, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5230
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 16
    • 84902075936 scopus 로고    scopus 로고
    • Trend Micro. Deep Security. http://emea.trendmicro.com/emea/products/ enterprise/deep-security/.
    • Deep Security
  • 18
    • 84863579719 scopus 로고    scopus 로고
    • VMware. VMsafe. http://www.vmware.com/.
    • VMsafe


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.