Design and implementation of a trusted monitoring framework for cloud platforms
暂无分享,去创建一个
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[3] Jianxin Li,et al. CyberGuarder: A virtualization security assurance architecture for green cloud computing , 2012, Future Gener. Comput. Syst..
[4] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[5] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[6] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[8] Eli M. Dow,et al. Xen and the Art of Repeated Research , 2004, USENIX Annual Technical Conference, FREENIX Track.
[9] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[10] Andrea C. Arpaci-Dusseau,et al. VMM-based hidden process detection and identification using Lycosid , 2008, VEE '08.
[11] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[12] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[13] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[14] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[15] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[16] T. Chiueh,et al. A Survey on Virtualization Technologies , 2005 .
[17] Hai Jin,et al. VMDriver: A Driver-Based Monitoring Mechanism for Virtualization , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[18] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[19] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[20] Tal Garfinkel,et al. Virtual machine monitors: current technology and future trends , 2005, Computer.
[21] Dutch T. Meyer,et al. Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper) , 2008, NSDI.
[22] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[23] Raheem A. Beyah,et al. Toward Revealing Kernel Malware Behavior in Virtual Execution Environments , 2009, RAID.
[24] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[25] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.