Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
暂无分享,去创建一个
[1] Levente Buttyán,et al. nEther: in-guest detection of out-of-the-guest malware analyzers , 2011, EUROSEC '11.
[2] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[3] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[4] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[5] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[6] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[7] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[8] Stefan Katzenbeisser,et al. Fast dynamic extracted honeypots in cloud computing , 2012, CCSW '12.
[9] Aggelos Kiayias,et al. Virtual Machine Introspection in a Hybrid Honeypot Architecture , 2012, CSET.
[10] Eyal de Lara,et al. SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.
[11] Xuxian Jiang,et al. Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction , 2010, TSEC.
[12] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[13] Zhi Wang,et al. DKSM: Subverting Virtual Machine Introspection for Fun and Profit , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[14] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[15] Abhinav Srivastava,et al. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections , 2008, RAID.
[16] Jonathon T. Giffin,et al. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2011, 2011 IEEE Symposium on Security and Privacy.