Remote detection of virtual machine monitors with fuzzy benchmarking
暂无分享,去创建一个
Adrian Perrig | Jonathan M. McCune | Arvind Seshadri | Mark Luk | Jason Franklin | Leendert van Doorn | L. van Doorn | Jason Franklin | A. Perrig | Arvind Seshadri | M. Luk | J. McCune
[1] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[2] Philippe Roussel,et al. The microarchitecture of the intel pentium 4 processor on 90nm technology , 2004 .
[3] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[4] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[5] Tal Garfinkel,et al. Data lifetime is a systems problem , 2004, EW 11.
[6] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[7] Helen J. Wang,et al. Virtual Playgrounds for Worm Behavior Investigation , 2005, RAID.
[8] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[9] F. O R M A T I O N G U I D. Timekeeping in VMware Virtual Machines , 2004 .
[10] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[11] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[12] Eric Rotenberg,et al. Trace cache: a low latency approach to high bandwidth instruction fetching , 1996, Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture. MICRO 29.
[13] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[16] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.