Virtualization Detection : New Strategies and Their Effectiveness
暂无分享,去创建一个
[1] Samuel T. King,et al. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.
[2] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[4] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[5] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[6] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[7] Ulrich Drepper,et al. What Every Programmer Should Know About Memory , 2007 .
[8] Adrian Perrig,et al. Towards Sound Detection of Virtual Machines , 2008, Botnet Detection.
[9] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[10] Peter Ferrie. Attacks on More Virtual Machine Emulators , 2007 .