A Virtual Machine Introspection Based Architecture for Intrusion Detection
暂无分享,去创建一个
[1] B. D. Gold,et al. A security retrofit of VM/370 , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Robert P. Goldberg,et al. Architectural Principles for Virtual Computer Systems , 1973 .
[3] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[4] B. D. Gold,et al. VM/370 security retrofit program , 1977, ACM '77.
[5] Marvin Schaefer,et al. Program confinement in KVM/370 , 1977, ACM '77.
[6] Barry D. Gold,et al. KVM/370 in Retrospect , 1984, 1984 IEEE Symposium on Security and Privacy.
[7] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[8] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[9] Fred B. Schneider,et al. Hypervisor-based fault tolerance , 1996, TOCS.
[10] Scott Devine,et al. Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.
[11] Scott Devine,et al. Using the SimOS machine simulator to study complex computer systems , 1997, TOMC.
[12] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[15] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[16] Guido Rossum,et al. Python Reference Manual , 2000 .
[17] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[18] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[19] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[20] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[21] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[22] V. Rao Vemuri,et al. Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.
[23] Marianne Shaw,et al. Scale and performance in the Denali isolation kernel , 2002, OSDI '02.
[24] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[25] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[26] Calvin Ko,et al. Detecting and countering system intrusions using software wrappers , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].