VirtAV: An agentless antivirus system based on in-memory signature scanning for virtual machine
暂无分享,去创建一个
[1] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[2] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[3] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[4] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[6] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[7] Zhiyong Liu,et al. Libvmi: A Library for Bridging the Semantic Gap between Guest OS and VMM , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[8] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[9] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[10] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[11] Yubin Xia,et al. Defending against VM rollback attack , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[12] Zhendong Su,et al. Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.
[13] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[14] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[15] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[16] Wenke Lee,et al. Secure in-VM monitoring using hardware virtualization , 2009, CCS.