메뉴 건너뛰기




Volumn 8639 LNCS, Issue , 2014, Pages 48-61

Kernel memory protection by an insertable hypervisor which has VM introspection and stealth breakpoints

Author keywords

Computer Security; Information Leakage; Stealth Breakpoints; Virtual Machine Introspection

Indexed keywords

AUTHENTICATION; SECURITY SYSTEMS;

EID: 84907351092     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-09843-2_4     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 2
    • 80052179046 scopus 로고    scopus 로고
    • Korset: Automated, Zero False-Alarm Intrusion Detection for Linux
    • Ben-Cohen, O., Wool, A.: Korset: Automated, Zero False-Alarm Intrusion Detection for Linux. In: Linux Symposium (2008)
    • (2008) Linux Symposium
    • Ben-Cohen, O.1    Wool, A.2
  • 9
    • 54049106582 scopus 로고    scopus 로고
    • Virtual Machine Introspection: Observation or Interference?
    • Nance, K., Bishop, M., Hay, B.: Virtual Machine Introspection: Observation or Interference? IEEE Security and Privacy 6(5) (2008)
    • (2008) IEEE Security and Privacy , vol.6 , pp. 5
    • Nance, K.1    Bishop, M.2    Hay, B.3
  • 11
    • 67650079952 scopus 로고    scopus 로고
    • BitVisor: A Thin Hypervisor for Enforcing I/O Device Security
    • Shinagawa, T., et al.: BitVisor: A Thin Hypervisor for Enforcing I/O Device Security, Virtual Execution Environments, VEE (2009)
    • (2009) Virtual Execution Environments, VEE
    • Shinagawa, T.1
  • 16
    • 84863351787 scopus 로고    scopus 로고
    • V2E: Combining hardware virtualization and softwareemulation for transparent and extensible malware analysis
    • Yan, L., Jayachandra, M., Zhang, M., Yin, H.: V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis, Virtual Execution Environments, VEE (2012)
    • (2012) Virtual Execution Environments, VEE
    • Yan, L.1    Jayachandra, M.2    Zhang, M.3    Yin, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.