Author:
Zeng Junyuan,Fu Yangchun,Lin Zhiqiang
Publisher
Springer International Publishing
Reference31 articles.
1. Linux test project. https://github.com/linux-test-project
2. QEMU: an open source processor emulator. http://www.qemu.org/
3. Balakrishnan, G., Reps, T. Analyzing memory accesses in $$\times $$ 86 executables. In: CC, March 2004
4. Bauman, E., Ayoade, G., Lin, Z.: A survey on hypervisor based monitoring: approaches, applications, and evolutions. ACM Comput. Surv. 48(1), 10:1–10:33 (2015)
5. Bianchi, A., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Blacksheep: detecting compromised hosts in homogeneous crowds. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, North Carolina, USA, pp. 341–352 (2012)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers;Digital Threats: Research and Practice;2021-03
2. A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018
3. PT-CFI;Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy;2017-03-22