1. VENOM vulnerability. CVE-2015-3456 (2015)
2. Symantec: Internet Security Threat Report, vol. 21 (2016)
3. Hatada, M., Akiyama, M., Matsuki, T., Kasama, T.: Empowering anti-malware research in Japan by sharing the MWS datasets. J. Inf. Process. 23(5), 579–588 (2015)
4. Takata, Y., Terada, M., Murakami, J., Kasama, T., Yoshioka, K., Hatada, M.: Datasets for anti-malware research $$\sim $$ ∼ MWS datasets 2016 $$\sim $$ ∼ . In: IPSJ SIG Technical Report, vol. 2016-CSEC-74 (2016)
5. Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is not transparency: VMM detection myths and realities. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems (2007)