메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Virtualization and forensics

(2)  Barrett, Diane a   Kipper, Gregory a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85013744824     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/C2009-0-61118-1     Document Type: Book
Times cited : (15)

References (129)
  • 2
    • 84882368610 scopus 로고    scopus 로고
    • Gartner: CIOs look to lighter-weight, social technologies to transform IT
    • January 20
    • Dubie D. Gartner: CIOs look to lighter-weight, social technologies to transform IT. Network World 2010, January 20, Retrieved from. http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it%3Feid=-1533.
    • (2010) Network World
    • Dubie, D.1
  • 4
    • 84882292575 scopus 로고    scopus 로고
    • Emerging technology analysis: hosted virtual desktops
    • February 17
    • Gammage B., Jump A. Emerging technology analysis: hosted virtual desktops. Gartner group 2009, February 17, Retrieved from. http://www.gartner.com/DisplayDocument%3Fref=g_search%26id=887912%26subref=simplesearch.
    • (2009) Gartner group
    • Gammage, B.1    Jump, A.2
  • 5
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: security challenges in virtual machine based computing environments
    • June 12-15. Santa Fe, NM.
    • Garfinkel T., Rosenblum M. When virtual is harder than real: security challenges in virtual machine based computing environments. Proceedings of the 10th Workshop on Hot Topics in Operating Systems 2005, June 12-15. Santa Fe, NM.
    • (2005) Proceedings of the 10th Workshop on Hot Topics in Operating Systems
    • Garfinkel, T.1    Rosenblum, M.2
  • 6
    • 84882391896 scopus 로고    scopus 로고
    • Gartner predicts nearly half of server workloads will be virtualized
    • October 20
    • Messmer E. Gartner predicts nearly half of server workloads will be virtualized. Network World 2009, October 20, Retrieved from. http://www.networkworld.com/news/2009/102009-gartner-server-virtualization.html.
    • (2009) Network World
    • Messmer, E.1
  • 8
    • 84882401287 scopus 로고    scopus 로고
    • Rise of the virtual machine
    • February
    • Orakwue E. Rise of the virtual machine. ISSA Journal 2009, February, Retrieved from. http://www.issa.org/Library/Journals/2009/February/Orakwue-Rise%20of%20the%20Virtual%20Machine.pdf.
    • (2009) ISSA Journal
    • Orakwue, E.1
  • 9
    • 84882333970 scopus 로고    scopus 로고
    • Paravirtualization API version 2.5., Retrieved from
    • Copyright 2005, 2006. VMware, Inc Paravirtualization API version 2.5., Retrieved from. http://www.vmware.com/pdf/vmi_specs.pdf.
    • Copyright 2005, 2006. VMware, Inc
  • 10
    • 84882352292 scopus 로고    scopus 로고
    • (n.d.) Formal requirements for virtualizable third generation architectures. Los Angeles: University of California, Honeywell Information Systems and Harvard University.
    • Popek, G. J., & Goldberg, R. P. (n.d.) Formal requirements for virtualizable third generation architectures. Los Angeles: University of California, Honeywell Information Systems and Harvard University.
    • Popek, G.J.1    Goldberg, R.P.2
  • 11
    • 84882397946 scopus 로고    scopus 로고
    • VMWare, Inc. (n.d.). Understanding full virtualization, paravirtualization, and hardware assist. Retrieved from
    • VMWare, Inc. (n.d.). Understanding full virtualization, paravirtualization, and hardware assist. Retrieved from. http://www.vmware.com/files/pdf/VMware_paravirtualization.pdf.
  • 12
    • 84882414578 scopus 로고    scopus 로고
    • Virtual Data Center E-Zine, (2010, January),. Retrieved from
    • Virtual Data Center E-Zine, (2010, January), Volume 18. Retrieved from. http://searchdatacenter.techtarget.com/generic/0,295582,sid80_gci1313630,00.html.
    • , vol.18
  • 13
    • 84882293298 scopus 로고    scopus 로고
    • http://www.scribd.com/doc/17770659/VirtualizationReport-for-Seminar.
  • 14
    • 84882430684 scopus 로고    scopus 로고
    • http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it%3Feid=-1533.
  • 15
    • 84882327217 scopus 로고    scopus 로고
    • http://www.gartner.com/DisplayDocument%3Fid=5651.
  • 16
    • 84882362917 scopus 로고    scopus 로고
    • http://www.wmware.com.
  • 17
    • 84882402754 scopus 로고    scopus 로고
    • http://www.parallels.com.
  • 18
    • 84882354117 scopus 로고    scopus 로고
    • http://www.microsoft.com/windows/virtual-pc/.
  • 19
    • 84882390070 scopus 로고    scopus 로고
    • http://www.virtualbox.org/manual/UserManual.html.
  • 20
    • 84882328814 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html.
  • 21
    • 84882396542 scopus 로고    scopus 로고
    • Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan
    • November 30
    • Frost, Sullivan Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan. Frost & Sullivan 2009, November 30, Retrieved from. http://www.frost.com/prod/servlet/press-release.pag%3Fdocid=185829213.
    • (2009) Frost & Sullivan
    • Frost, S.1
  • 22
    • 84882300377 scopus 로고    scopus 로고
    • Virtualization and virtual machine software. We help you to choose the best VM
    • June
    • Kusnetzky D. Virtualization and virtual machine software. We help you to choose the best VM. Hacking IT Security Magazine 2007, June.
    • (2007) Hacking IT Security Magazine
    • Kusnetzky, D.1
  • 24
    • 84882331775 scopus 로고    scopus 로고
    • What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions
    • March
    • Suzuki Y., Moriyama M. What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions. Techrepublic.com 2006, March, Retrieved from. http://whitepapers.techrepublic.com.com/abstract.aspx?docid=344989.
    • (2006) Techrepublic.com
    • Suzuki, Y.1    Moriyama, M.2
  • 25
    • 84882354364 scopus 로고    scopus 로고
    • SAN-based storage virtualization: five benefits for your customers
    • October 10
    • Peterson B. SAN-based storage virtualization: five benefits for your customers. Search Storage Channel.com 2007, October 10, Retrieved from. http://searchstoragechannel.techtarget.com/tip/0,289483,sid98_gci1274842,00.html.
    • (2007) Search Storage Channel.com
    • Peterson, B.1
  • 26
    • 84882442227 scopus 로고    scopus 로고
    • 10 key differences between desktop and server virtualization deployments
    • November 23
    • Preimesberger C. 10 key differences between desktop and server virtualization deployments. eWeek.com 2009, November 23, Retrieved from. http://www.eweek.com/c/a/Data-Storage/10-Key-Differences-Between-Desktop-and-Server-Virtualization-Deployments-152781/.
    • (2009) eWeek.com
    • Preimesberger, C.1
  • 28
    • 84882346287 scopus 로고    scopus 로고
    • http://www.wmware.com.
  • 29
    • 84882444898 scopus 로고    scopus 로고
    • http://www.wmware.com.
  • 30
    • 84882435953 scopus 로고    scopus 로고
    • http://www.parallels.com.
  • 31
    • 84882318395 scopus 로고    scopus 로고
    • http://www.microsoft.com/windows/virtual-pc/.
  • 32
    • 84882406454 scopus 로고    scopus 로고
    • http://www.virtualbox.org/manual/UserManual.html.
  • 33
    • 84882381953 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html.
  • 34
    • 84882401596 scopus 로고    scopus 로고
    • http://www.linux-forensics.com/.
  • 35
    • 84882370380 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/213673.
  • 36
    • 84882424602 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/813.
  • 37
    • 84882441453 scopus 로고    scopus 로고
    • http://www.e-fense.com/helix3pro.
  • 38
    • 84882409158 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/57815.
  • 39
    • 84882338605 scopus 로고    scopus 로고
    • http://www.caine-live.net/.
  • 41
    • 84882432812 scopus 로고    scopus 로고
    • Parallels virtuozzo containers offers 350 templates
    • Marshall D. Parallels virtuozzo containers offers 350 templates. InfoWorld virtualization report 2008, Retrieved from http://weblog.infoworld.com/virtualization/archives/2008/02/parallels_virtu.html.
    • (2008) InfoWorld virtualization report
    • Marshall, D.1
  • 43
    • 84882316081 scopus 로고    scopus 로고
    • RingCube MojoPac
    • RingCube MojoPac. http://www.mojopac.com/enterprise/products/index.html.
  • 44
    • 84882301166 scopus 로고    scopus 로고
    • LivePCs. Moka5.
    • LivePCs. Moka5. http://www.moka5.com/products/index.html.
  • 46
    • 84882385372 scopus 로고    scopus 로고
    • Run IT on a virtual hard disk - test drive program. Microsoft TechNet. Retrieved from
    • Run IT on a virtual hard disk - test drive program. Microsoft TechNet. Retrieved from. http://technet.microsoft.com/en-us/bb738372.aspx.
  • 47
    • 84882292455 scopus 로고    scopus 로고
    • Virtualization from the datacenter to the desktop. Microsoft TechNet. Retrieved from
    • Virtualization from the datacenter to the desktop. Microsoft TechNet. Retrieved from. http://technet.microsoft.com/en-us/virtualserver/bb676673.aspx.
  • 48
    • 84882332479 scopus 로고    scopus 로고
    • http://www.wmware.com.
  • 49
    • 84882367489 scopus 로고    scopus 로고
    • http://www.parallels.com.
  • 50
    • 84882341343 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html.
  • 53
    • 84882405304 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/getting-started/learn/faq.html.
  • 54
    • 84882336484 scopus 로고    scopus 로고
    • MetroPipe
    • The free portable privacy machine MetroPipe. http://www.metropipe.net/ppm.php?SID=4e38766ea6a3fab4792ced91b2bdbe48.
    • The free portable privacy machine
  • 55
    • 70350043605 scopus 로고    scopus 로고
    • Hiding in a virtual world using unconventionally installed operating systems
    • Dallas, TX.
    • Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326%26authDecision=-203.
    • (2009) IEEE International Conference on Intelligence and Security Informatics.
    • Bares, R.1
  • 56
    • 79952337297 scopus 로고    scopus 로고
    • Microsoft Corporation, Retrieved from
    • Virtual hard disk image format specification 2009, Microsoft Corporation, Retrieved from. http://download.microsoft.com/../Virtual%20Hard%20Disk%20Format%20Spec_10_18_06.doc.
    • (2009) Virtual hard disk image format specification
  • 57
    • 33847308562 scopus 로고    scopus 로고
    • Tackling the U3 trend with computer forensics
    • Retrieved from
    • Spruill A., Pavan C. Tackling the U3 trend with computer forensics. Journal of Digital Investigation 2007, 4(1). Retrieved from. http://www.sciencedirect.com/science?_ob=ArticleURL%26_udi=B7CW4-4N440CB-1%26_user=8303832%26_coverDate=03%2F31%2F2007%26_rdoc=1%26_fmt=high%26_orig=search%26_sort=d%26_docanchor=%26view=c%26_searchStrId=1285052568%26_rerunOrigin=google%26_acct=C000000593%26_version=1%26_urlVersion=0%26_userid=8303832%26md5=a1cb63ae1f78f6b950cc2a28c540f4ed.
    • (2007) Journal of Digital Investigation , vol.4 , Issue.1
    • Spruill, A.1    Pavan, C.2
  • 60
    • 70350043605 scopus 로고    scopus 로고
    • Hiding in a virtual world using unconventionally installed operating systems.
    • Dallas, TX.
    • Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326&authDecision=-203.
    • (2009) IEEE International Conference on Intelligence and Security Informatics.
    • Bares, R.1
  • 61
    • 84882425555 scopus 로고    scopus 로고
    • Ghost in the machine: Forensic evidence collection in the virtual environment
    • Fiterman E.M., Durick J.D. Ghost in the machine: Forensic evidence collection in the virtual environment. Digital Forensics Magazine 2010, 2:73-77.
    • (2010) Digital Forensics Magazine , vol.2 , pp. 73-77
    • Fiterman, E.M.1    Durick, J.D.2
  • 63
    • 84882351674 scopus 로고    scopus 로고
    • VMware GSX server documentation
    • VMware GSX server documentation. http://www.vmware.com/support/gsx25/doc/performance_memory_reserved_gsx.html.
  • 64
    • 84882317259 scopus 로고    scopus 로고
    • VMware patents applied for
    • VMware patents applied for. http://www.patentstorm.us/attorney-applications/VMware__Inc_/241723/1.html.
  • 65
    • 84882437209 scopus 로고    scopus 로고
    • http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html.
  • 67
    • 38349023177 scopus 로고    scopus 로고
    • Attacks on more virtual machine emulators
    • Retrieved from
    • Ferrie P. Attacks on more virtual machine emulators. Symantic Advanced Threat Research 2007, Retrieved from. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf.
    • (2007) Symantic Advanced Threat Research
    • Ferrie, P.1
  • 69
    • 84898096655 scopus 로고    scopus 로고
    • Virtual machine forensics, a discussion of virtual machines related to forensics analysis
    • Retrieved from
    • Shavers B. Virtual machine forensics, a discussion of virtual machines related to forensics analysis. Forensic Focus 2008, Retrieved from. http://www.forensicfocus.com.
    • (2008) Forensic Focus
    • Shavers, B.1
  • 70
    • 84882417710 scopus 로고    scopus 로고
    • Contributor Accessed 14.03.07.
    • Stagner, H. (2007). How to detect rogue virtual machines on a network. Retrieved from. Contributor Accessed 14.03.07. http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1247530_mem1,00.html.
    • (2007) How to detect rogue virtual machines on a network.
    • Stagner, H.1
  • 71
    • 84882316038 scopus 로고    scopus 로고
    • Evidentiary value of link files
    • Retrieved from
    • Weilbacher N. Evidentiary value of link files. Forensic Focus 2006, Retrieved from. http://www.forensicfocus.com/link-file-evidentiary-value.
    • (2006) Forensic Focus
    • Weilbacher, N.1
  • 72
    • 84882393405 scopus 로고    scopus 로고
    • Inventorying virtual hard disk files on a server or domain
    • Retrieved from
    • Wolf C. Inventorying virtual hard disk files on a server or domain. Virtualization Review 2007, Retrieved from. http://virtualizationreview.com/articles/2007/05/01/inventorying-virtualhard-disk-files-on-a-server-or-domain.aspx.
    • (2007) Virtualization Review
    • Wolf, C.1
  • 73
    • 84882437914 scopus 로고    scopus 로고
    • Rogue VMs be very afraid
    • Retrieved from, Accessed 01.06.08.
    • Wolf C. Rogue VMs be very afraid. Virtualization Review 2008, Retrieved from, Accessed 01.06.08. http://virtualizationreview.com/articles/2008/06/01/rogue-vms-be-very-afraid.aspx.
    • (2008) Virtualization Review
    • Wolf, C.1
  • 74
    • 84882380803 scopus 로고    scopus 로고
    • Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180
    • Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180,. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180.
  • 75
    • 84882310267 scopus 로고    scopus 로고
    • What files make up a virtual machine?
    • What files make up a virtual machine? http://www.vmware.com/support/ws55/doc/ws_learningfiles_in_a_vm.html.
  • 76
    • 84882422144 scopus 로고    scopus 로고
    • Understanding virtual machine snapshots in VMware ESX.
    • Understanding virtual machine snapshots in VMware ESX. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180.
  • 77
    • 84882310238 scopus 로고    scopus 로고
    • http://www.virtualizationdaily.com/archives/73_how-to-convert-a-vmware-virtual-appliance-to-work-with-parallels.html.
  • 78
    • 84882397574 scopus 로고    scopus 로고
    • http://vmtoolkit.com/.
  • 79
    • 84882307467 scopus 로고    scopus 로고
    • http://viethak.com/2009/11/27/Convert-VMDK-to-VHD-Virtual-Disk-or-Vice-versa-Using-StarWind-Image-Converter.html.
  • 80
    • 84882436826 scopus 로고    scopus 로고
    • Accessed 12.11.08
    • Barrett A. VMware makes the case for PCI DSS compliance Retrieved from http://searchservervirtualization.techtarget.com/news/article/0,289142,sid94_gci1338681,00.html. Accessed 12.11.08. http://SearchServerVirtualization.com.
    • VMware makes the case for PCI DSS compliance
    • Barrett, A.1
  • 81
    • 74549210176 scopus 로고    scopus 로고
    • Computer forensic analysis in a virtual environment
    • Fall
    • Bem D., Huebner E. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence 2007, Fall, 6(2). http://www.ijde.org.
    • (2007) International Journal of Digital Evidence , vol.6 , Issue.2
    • Bem, D.1    Huebner, E.2
  • 82
    • 84882304651 scopus 로고    scopus 로고
    • Automating D2D backup of virtual machines
    • Retrevied from, Accessed 01.10.09
    • Fegreus J. Automating D2D backup of virtual machines. InfoStor 2009, Retrevied from, Accessed 01.10.09. http://www.infostor.com/index/articles/display/articles/infostor/backup-and_recovery/disk-based-backup/lab-review__automating.html.
    • (2009) InfoStor
    • Fegreus, J.1
  • 83
    • 84882351470 scopus 로고    scopus 로고
    • How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization
    • Retrieved from
    • Hau W., Araujo R., Chudgar V., Hustad R., Chaubal C. How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization. VMware 2009, Retrieved from. http://www.vmware.com/files/pdf/technology/mapping_pci_req_part1_wp.pdf.
    • (2009) VMware
    • Hau, W.1    Araujo, R.2    Chudgar, V.3    Hustad, R.4    Chaubal, C.5
  • 84
    • 84882360006 scopus 로고    scopus 로고
    • How virtualization affects PCI DSS Part 2: a review of the top five issues
    • Retrieved from
    • Hau W., Araujo R., Chudgar V., Hustad R., Chaubal C. How virtualization affects PCI DSS Part 2: a review of the top five issues. VMware 2010, Retrieved from. http://www.vmware.com/files/pdf/technology/review_top5_issues_wp.pdf.
    • (2010) VMware
    • Hau, W.1    Araujo, R.2    Chudgar, V.3    Hustad, R.4    Chaubal, C.5
  • 85
    • 84882413365 scopus 로고    scopus 로고
    • Virtual machines you have to see them to manage them
    • Retrieved from
    • Kusnetzky D. Virtual machines you have to see them to manage them. Kusnetsky group 2007, Retrieved from. http://www.virtual-strategy.com/Dan-Kusnetzky/Virtual-Machines-You-Have-to-See-Them-to-Manage-Them.html.
    • (2007) Kusnetsky group
    • Kusnetzky, D.1
  • 86
    • 84882368297 scopus 로고    scopus 로고
    • Virtual machines can be an e-discovery nightmare
    • Retrieved from
    • Miller R. Virtual machines can be an e-discovery nightmare. Fierce Content Management 2008, Retrieved from. http://www.fiercecontentmanagement.com/story/virtual-machines-can-be-e-discovery-nightmare/2008-09-11.
    • (2008) Fierce Content Management
    • Miller, R.1
  • 87
    • 84882443234 scopus 로고    scopus 로고
    • How to find virtual machines for greater virtualization compliance
    • Retrieved from, Accessed 07.08.09
    • Mortman D. How to find virtual machines for greater virtualization compliance. Information Security Magazine 2009, Retrieved from, Accessed 07.08.09. http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359272,00.html.
    • (2009) Information Security Magazine
    • Mortman, D.1
  • 88
    • 84882352427 scopus 로고    scopus 로고
    • Virtual machines pose e-discovery risk, vendor says
    • September 10
    • Shread P. Virtual machines pose e-discovery risk, vendor says. EnterpriseStorageForum 2008, September 10, Retrieved from. http://www.enterprisestorageforum.com/article.php/3770706.
    • (2008) EnterpriseStorageForum
    • Shread, P.1
  • 90
    • 84882335159 scopus 로고    scopus 로고
    • How Virtualization Affects EDD Collection ()
    • How Virtualization Affects EDD Collection (). http://Law.com.
  • 91
    • 84882324463 scopus 로고    scopus 로고
    • VM Sprawl - prevention rather than cure., Accessed 17.05.09.
    • VM Sprawl - prevention rather than cure., Accessed 17.05.09. http://www.techworld.com/virtualisation/news/index.cfm?newsID=115876&pagtype.
  • 92
    • 84882349645 scopus 로고    scopus 로고
    • Data center virtualization: Four steps to compliance, Special to SearchCIOMidmarket.com,. Accessed 11.06.08.
    • Data center virtualization: Four steps to compliance, Special to SearchCIOMidmarket.com,. Accessed 11.06.08. http://searchcompliance.techtarget.com/tip/0,289483,sid195_gci1340735_mem1,00.html.
  • 93
    • 84882382641 scopus 로고    scopus 로고
    • Virtualization: Enough holes to work Vegas
    • Retrieved from
    • Capelis D.J. Virtualization: Enough holes to work Vegas. Defcon 15, Las Vegas 2007, Retrieved from. http://www.dc414.org/download/confs/defcon15/Speakers/Capelis/dc-15-%20capelis.pdf.
    • (2007) Defcon 15, Las Vegas
    • Capelis, D.J.1
  • 94
    • 84882329858 scopus 로고    scopus 로고
    • Hypervisor security concerns
    • Retrieved from
    • Cargile A. Hypervisor security concerns. The Coffee Desk 2009, Retrieved from. http://thecoffeedesk.com/news/index.php/2009/12/01/hypervisor-security-concerns/.
    • (2009) The Coffee Desk
    • Cargile, A.1
  • 96
    • 77953163208 scopus 로고    scopus 로고
    • Virtual machine security guidelines (version 1)
    • Retrieved from, J. Kirch (Ed.)
    • Virtual machine security guidelines (version 1). The Center for Internet Security 2007, Retrieved from. http://www.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf, J. Kirch (Ed.).
    • (2007) The Center for Internet Security
  • 97
    • 38349023177 scopus 로고    scopus 로고
    • Attacks on more virtual machine emulators
    • Retrieved from
    • Ferrie P. Attacks on more virtual machine emulators. Symantic Advanced Threat Research 2007, Retrieved from. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf.
    • (2007) Symantic Advanced Threat Research
    • Ferrie, P.1
  • 98
    • 84882447422 scopus 로고    scopus 로고
    • Retrieved from
    • Hankeln video Retrieved from. http://sanbarrow.com/latest-videoesxi-exe.html.
    • Hankeln, V.1
  • 100
    • 84893734563 scopus 로고    scopus 로고
    • On the cutting edge: Thwarting virtual machine
    • Retrieved from
    • Liston T., Skoudis E. On the cutting edge: Thwarting virtual machine. IntelGuardians 2006, Retrieved from. http://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf.
    • (2006) IntelGuardians
    • Liston, T.1    Skoudis, E.2
  • 101
    • 84882309908 scopus 로고    scopus 로고
    • Data recovery and information about solid state devices and NAND flash memory
    • August
    • Moulton S. Data recovery and information about solid state devices and NAND flash memory. Video posted to 2008, August, http://www.youtube.com/view_play_list%3Fp=C337FACBF12BDCE2.
    • (2008) Video posted to
    • Moulton, S.1
  • 104
    • 84882420575 scopus 로고    scopus 로고
    • TIG Security Technical Implementation Guides Information Assurance Support Environment
    • STIG Security Technical Implementation Guides Information Assurance Support Environment Retrieved from. http://iase.disa.mil/stigs/stig/index.html.
  • 108
    • 84882415426 scopus 로고    scopus 로고
    • Install and Configure ESX server
    • Install and Configure ESX server. http://virtualizationinformation.com/docs/Notes%20on%20VI%203.pdf.
  • 109
    • 84882314265 scopus 로고    scopus 로고
    • Defragmenting virtual machine files
    • Defragmenting virtual machine files. http://itknowledgeexchange.techtarget.com/virtualization-pro/defragmenting-virtual-machine-disk-files/.
  • 110
    • 84882438851 scopus 로고    scopus 로고
    • VMware, Randell. August presentation to the Arizona Security Practitioners Forum (AZSPF)
    • VMware, Randell. August 2008 presentation to the Arizona Security Practitioners Forum (AZSPF).
    • (2008)
  • 111
    • 84882351970 scopus 로고    scopus 로고
    • Xen Wiki Hypercall formal definition
    • Xen Wiki Hypercall formal definition.
  • 113
    • 84882381949 scopus 로고    scopus 로고
    • Network segmentation in virtualized environments. VMware white paper.
    • Network segmentation in virtualized environments. VMware white paper. http://www.vmware.com/files/pdf/network_segmentation.pdf.
  • 114
    • 84882379544 scopus 로고    scopus 로고
    • InfoClipz: Cloud Computing. April 2009.
    • InfoClipz: Cloud Computing. April 2009. http://InfoWorld.com.
  • 115
    • 84882343450 scopus 로고    scopus 로고
    • Cloud computing deep dive
    • September
    • Beckman M. Cloud computing deep dive. InfoWorld 2009, September.
    • (2009) InfoWorld
    • Beckman, M.1
  • 116
    • 84882434493 scopus 로고    scopus 로고
    • Cloud computing and network forensics in the eyes of computer forensic examiner
    • 02/
    • Amoah S. Cloud computing and network forensics in the eyes of computer forensic examiner. Decision Group 02/2010.
    • (2010) Decision Group
    • Amoah, S.1
  • 118
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • December
    • Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance December 2009.
    • (2009) Cloud Security Alliance
  • 120
    • 84882420674 scopus 로고    scopus 로고
    • The future of virtualization: a view from the front lines
    • May 6
    • Stokes J. The future of virtualization: a view from the front lines. ars technica 2009, May 6, Retrieved from. http://arstechnica.com/business/news/2009/05/the-future-of-virtualization-a-view-from-the-front-lines.ars.
    • (2009) ars technica
    • Stokes, J.1
  • 121
    • 84882335791 scopus 로고    scopus 로고
    • Virtualization goes mobile
    • April 9
    • Kharif O. Virtualization goes mobile. BusinessWeek Online 2008, April 9, Retrieved from. http://www.businessweek.com/technology/content/apr2008/tc20080421_235517.htm?chan=technology_technology%2Bindex%2Bpage_top%2Bst.
    • (2008) BusinessWeek Online
    • Kharif, O.1
  • 122
    • 84882339316 scopus 로고    scopus 로고
    • VMWare Mobile Virtualization Platform, (n.d.). Retrieved from
    • VMWare Mobile Virtualization Platform, (n.d.). Retrieved from. http://www.vmware.com/products/mobile/.
  • 123
    • 84882290509 scopus 로고    scopus 로고
    • Retrieved from
    • Tozzi J. The rise of the Homepreneur Retrieved from. http://www.businessweek.com/smallbiz/content/oct2009/sb20091023_263258.htm.
    • The rise of the Homepreneur
    • Tozzi, J.1
  • 124
    • 84882310817 scopus 로고    scopus 로고
    • Mobile phone virtualization to really enable workers and IT staff
    • NetworkWorld Asia Staff, September 4
    • Mobile phone virtualization to really enable workers and IT staff. NetworkWorldAsia 2009, September 4, NetworkWorld Asia Staff, Retrieved from. http://www.networksasia.net/content/mobile-phone-virtualization-really-enable-workers-and-it-staff.
    • (2009) NetworkWorldAsia
  • 126
    • 84882384449 scopus 로고    scopus 로고
    • Retrieved from
    • Mark R. House Passes Cyber-Security Act Retrieved from. http://www.eweek.com/c/a/Government-IT/House-Passes-Cybersecurity-Act-682741/.
    • House Passes Cyber-Security Act
    • Mark, R.1
  • 127
    • 83055189175 scopus 로고    scopus 로고
    • Gartner: Brace yourself for cloud computing
    • October 20
    • Shankland S. Gartner: Brace yourself for cloud computing. CNET news 2009, October 20, Retrieved from. http://news.cnet.com/8301-30685_3-10378782-264.html.
    • (2009) CNET news
    • Shankland, S.1
  • 129
    • 84882300055 scopus 로고    scopus 로고
    • How autonomic computing will reshape IT
    • October 15
    • Horn P. How autonomic computing will reshape IT. CNET news 2001, October 15, Retrieved from. http://news.cnet.com/2010-1071-281578.html.
    • (2001) CNET news
    • Horn, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.