Author:
Vogl Sebastian,Kilic Fatih,Schneider Christian,Eckert Claudia
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Lecture Notes in Computer Science;M. Carbone,2012
2. Carbone, M., Cui, W., Lu, L., Lee, W., Peinado, M., Jiang, X.: Mapping kernel objects to enable systematic integrity checking. In: Proc. of 16th ACM Conf. on Computer and Communications Security, pp. 555–565. ACM (2009)
3. Chen, P.M., Noble, B.D.: When virtual is better than real. In: Proc. of the 8th Workshop on Hot Topics in Operating Systems. IEEE (2001)
4. Chiueh, T., Conover, M., Lu, M., Montague, B.: Stealthy deployment and execution of in-guest kernel agents. In: BlackHat USA (2009)
5. Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., Lee, W.: Virtuoso: Narrowing the semantic gap in virtual machine introspection. In: Proc. of Symp. on Sec. & Priv. IEEE (2011)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. VMSH;Proceedings of the Seventeenth European Conference on Computer Systems;2022-03-28
2. Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection;Developments in Language Theory;2018
3. Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection;ICT Systems Security and Privacy Protection;2018
4. Safe Inspection of Live Virtual Machines;ACM SIGPLAN Notices;2017-09-14
5. Safe Inspection of Live Virtual Machines;Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments;2017-04-08