CloudVMI: Virtual Machine Introspection as a Cloud Service
暂无分享,去创建一个
Abhinav Srivastava | Jacobus E. van der Merwe | Hyun Wook Baek | H. Baek | Abhinav Srivastava | J. Merwe
[1] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[2] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[3] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[4] Abhinav Srivastava,et al. Trusted VM Snapshots in Untrusted Cloud Infrastructures , 2012, RAID.
[5] Abhinav Srivastava,et al. Towards a richer model of cloud app markets , 2012, CCSW '12.
[6] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[7] Chun Zhang,et al. vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities , 2009, USENIX Annual Technical Conference.
[8] Samuel T. King,et al. Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.
[9] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[10] Abhinav Srivastava,et al. Self-service cloud computing , 2012, CCS '12.
[11] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[12] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[13] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[14] Jeffrey S. Chase,et al. Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications , 2011, CCSW '11.
[15] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[16] Abhinav Srivastava,et al. Automatic Discovery of Parasitic Malware , 2010, RAID.
[17] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[18] Abhinav Srivastava,et al. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections , 2008, RAID.
[19] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.