EagleEye: Towards mandatory security monitoring in virtualized datacenter environment
暂无分享,去创建一个
Yu-Sung Wu | Yi-Yung Chen | Pei-Keng Sun | Chun-Chi Huang | Sung-Jer Lu | Syu-Fang Lai | Yu-Sung Wu | Yi-Yung Chen | Pei-Keng Sun | Chun-Chi Huang | Sung-Jer Lu | Syu-Fang Lai
[1] Mark Russinovich,et al. Windows® Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition , 2009 .
[2] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[3] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[4] F. O R M A T I O N G U I D. Timekeeping in VMware Virtual Machines , 2004 .
[5] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[6] Zhao Yu,et al. SR-IOV Networking in Xen: Architecture, Design and Implementation , 2008, Workshop on I/O Virtualization.
[7] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[8] Barton P. Miller,et al. Virtual machine-provided context sensitive page mappings , 2008, VEE '08.
[9] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[10] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Samuel T. King,et al. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.
[12] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[13] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[14] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.