An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis
暂无分享,去创建一个
[1] Barruquer Moner. IX. References , 1971 .
[2] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[3] Marvin Schaefer,et al. Program confinement in KVM/370 , 1977, ACM '77.
[4] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[5] Randy H. Katz,et al. Verifying a multiprocessor cache controller using random test generation , 1990, IEEE Design & Test of Computers.
[6] Richard J. Feiertag,et al. A separation model for virtual machine monitors , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] W. M. McKeeman,et al. Differential Testing for Software , 1998, Digit. Tech. J..
[8] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[9] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[10] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[11] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[12] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[13] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[14] HarrisTim,et al. Xen and the art of virtualization , 2003 .
[15] Paul A. Karger,et al. Multi-level security requirements for hypervisors , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[16] Eric Van Hensbergen. The Effect of Virtualization on OS Interference , 2005 .
[17] Leendert van Doorn,et al. Hardware virtualization trends , 2006, VEE '06.
[18] Zhendong Su,et al. Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.
[19] Barton P. Miller,et al. An empirical study of the robustness of MacOS applications using random testing , 2006, RT '06.
[20] Jimi Xenidis,et al. Utilizing IOMMUs for Virtualization in Linux and Xen Muli , 2006 .
[21] David Lie,et al. Using VMM-based sensors to monitor honeypots , 2006, VEE '06.
[22] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[23] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[24] Glenn Durfee,et al. Practical Uses of Virtual Machines for Protection of Sensitive User Data , 2007, ISPEC.