Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds
暂无分享,去创建一个
[1] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[2] Heng Yin,et al. OS-Sommelier: memory-only operating system fingerprinting in the cloud , 2012, SoCC '12.
[3] Hai Huang,et al. Security implications of memory deduplication in a virtualized environment , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[4] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[5] Hai Huang,et al. Hyperprobe: Towards Virtual Machine Extrospection , 2015, LISA.
[6] Tavis Ormandy. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis , 2007 .
[7] Adrian Perrig,et al. Towards Sound Detection of Virtual Machines , 2008, Botnet Detection.
[8] Kevin R. B. Butler,et al. Leveraging USB to Establish Host Identity Using Commodity Devices , 2014, NDSS.
[9] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[10] Performance Evaluation of Intel EPT Hardware Assist , 2006 .
[11] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[12] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[13] Joshua LeVasseur,et al. Towards Scalable Multiprocessor Virtual Machines , 2004, Virtual Machine Research and Technology Symposium.
[14] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[15] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[16] Kevin R. B. Butler,et al. Host Identification via USB Fingerprinting , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[17] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[18] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[19] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[20] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[21] Peter Ferrie. Attacks on More Virtual Machine Emulators , 2007 .
[22] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[23] Angela Orebaugh,et al. Nmap in the Enterprise: Your Guide to Network Scanning , 2008 .
[24] Marc Merlin. Live Upgrading Thousands of Servers from an Ancient Red Hat Distribution to 10 Year Newer Debian Based One , 2013, LISA.
[25] John R. Lange,et al. Preemptable ticket spinlocks: improving consolidated performance in the cloud , 2013, VEE '13.
[26] Cyrille Artho,et al. Software Side Channel Attack on Memory Deduplication , 2011, SOSP 2011.
[27] Jaehyuk Huh,et al. Revisiting hardware-assisted page walks for virtualized systems , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[28] Weichao Wang,et al. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines , 2011, 30th IEEE International Performance Computing and Communications Conference.
[29] Ruby B. Lee,et al. Characterizing hypervisor vulnerabilities in cloud computing servers , 2013, Cloud Computing '13.
[30] Adrian Perrig,et al. Remote detection of virtual machine monitors with fuzzy benchmarking , 2008, OPSR.