Hidden OS Objects Correlated Detection Technology Based on VMM
暂无分享,去创建一个
[1] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[2] Yi-Min Wang,et al. Detecting stealth software with Strider GhostBuster , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[3] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[4] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[5] Li Qin,et al. Research and Design on Hypervisor Based Virtual Computing Environment , 2007 .
[6] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[7] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[8] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.
[9] Xuxian Jiang,et al. Towards a VMM-based usage control framework for OS kernel integrity protection , 2007, SACMAT '07.
[10] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[11] Jianxin Li,et al. CyberGuarder: A virtualization security assurance architecture for green cloud computing , 2012, Future Gener. Comput. Syst..