Publisher
Springer International Publishing
Reference11 articles.
1. Linux Audit. https://people.redhat.com/sgrubb/audit/. Accessed 02 Dec 2020
2. Latzo, T., Freiling, F.: Characterizing the limitations of forensic event reconstruction based on log files. In: Proceedings of 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 466–475 (2019)
3. Ma, S., Zhai, J., Kwon, Y., et al.: Kernel-supported cost-effective audit logging for causality tracking. In: Proceedings of 2018 USENIX Annual Technical Conference (USENIX ATC 2018), pp. 241–253 (2018)
4. Pfoh, J., Schneider, C., Eckert, C.: Nitro: hardware-based system call tracing for virtual machines. In: Proceedings of 6th International conference on Advances in Information and Computer Security, pp. 96–112 (2011)
5. Yan, L.K., Jayachandra, M., Zhang, M., Yin, H.: V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis. In: Proceedings of 8th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE 2012), pp. 227–237 (2012)