Author:
Wang Chonghua,Yun Xiaochun,Hao Zhiyu,Cui Lei,Han Yandong,Zou Qingxin
Publisher
Springer International Publishing
Reference67 articles.
1. Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: NDSS 2003, pp.191–206 (2003)
2. Payne, B., Carbone, M., Lee, W.: Secure and flexible monitoring of virtual machines. In: ACSAC 2007, pp. 385–397 (2007)
3. The volatility framework.
https://github.com/volatilityfoundation/volatility
4. Volatilitux.
https://code.google.com/p/volatilitux/
5. Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through VMM-based “out-of-the-box” semantic view reconstruction. In: CCS 2007, pp. 128–138 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献