Author:
Carbone Martim,Conover Matthew,Montague Bruce,Lee Wenke
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceedings of the 2003 Network and Distributed System Symposium (2003)
2. Payne, B.D., Carbone, M., Lee, W.: Secure and flexible monitoring of virtual machines. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007) (2007)
3. Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based ”out-of-the-box” semantic view reconstruction. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
4. Petroni, N.L., Fraser, T., Walters, A., Arbaugh, W.A.: An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In: Proceedings of the 15th USENIX Security Symposium (2006)
5. Petroni, N.L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Resuscitate a Sick VM in the Cloud;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2023-06
2. HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation;International Journal of Information and Computer Security;2023
3. Hecate;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
4. NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices;Cybersecurity;2022-11-01
5. VMSH;Proceedings of the Seventeenth European Conference on Computer Systems;2022-03-28