Intrusion detection in virtual machine environments
暂无分享,去创建一个
[1] Bill Blunden. Virtual Machine Design and Implementation in C/C++ with Cdrom , 2002 .
[2] Jeff Dike,et al. A user-mode port of the Linux kernel , 2000, Annual Linux Showcase & Conference.
[3] Massimo Bernaschi,et al. Operating system enhancements to prevent the misuse of system calls , 2000, CCS.
[4] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[5] Robert P. Goldberg,et al. Formal requirements for virtualizable third generation architectures , 1973, SOSP 1973.
[6] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[7] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[8] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[10] Massimo Bernaschi,et al. Remus: a security-enhanced operating system , 2002, TSEC.
[11] Richard J. Feiertag,et al. A separation model for virtual machine monitors , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] R. Goldberg. Architecture of virtual machines , 1899, Workshop on Virtual Computer Systems.
[13] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[14] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[15] Marianne Shaw,et al. Denali: a scalable isolation kernel , 2002, EW 10.
[16] Samuel T. King,et al. Operating System Extensions to Support Host Based Virtual Machines , 2000 .