Virtual machine introspection: towards bridging the semantic gap

Author:

More Asit,Tapaswi Shashikala

Publisher

Springer Science and Business Media LLC

Subject

Computer Networks and Communications,Software

Reference40 articles.

1. Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection In: NDSS. The Internet Society, San Diego, California, ISBN 1-891562-15-0. ., [ http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/13.pdf ] Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection In: NDSS. The Internet Society, San Diego, California, ISBN 1-891562-15-0. .

2. Chen PM, Noble BD: When virtual is better than real. In Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on. IEEE Computer Society, Los Alamitos, CA; 2001:0133–0133. http://doi.ieeecomputersociety.org/10.1109/HOTOS.2001.990073 http://doi.ieeecomputersociety.org/10.1109/HOTOS.2001.990073 10.1109/HOTOS.2001.990073

3. Pfoh J, Schneider C, Eckert C: Nitro: hardware-based system call tracing for virtual machines. In Proceedings of the 6th International Conference on Advances in Information and Computer Security, IWSEC'11. Springer-Verlag, Berlin, Heidelberg; 2011:96–112. ISBN 978–3-642–25140–5 http://dl.acm.org/citation.cfm?id=2075658.2075669 ISBN 978-3-642-25140-5 http://dl.acm.org/citation.cfm?id=2075658.2075669 10.1007/978-3-642-25141-2_7

4. Carbone M, Conover M, Montague B, Lee W: Secure and robust monitoring of virtual machines through guest-assisted introspection. In Research in attacks, intrusions, and defenses. Lecture Notes in Computer Science. Edited by: Balzarotti D, Stolfo SJ, Cova M. Springer, Berlin Heidelberg; 2012:22–41. http://dx.doi.org/10.1007/978–3-642–33338–5_2 http://dx.doi.org/10.1007/978-3-642-33338-5_2 10.1007/978-3-642-33338-5_2

5. Butt S, Lagar-Cavilla HA, Srivastava A, Ganapathy V: Self-service cloud computing. Proceedings of the ACM Conference on Computer and Communications Security. Raleigh, North Carolina ACM, Raleigh, New York, NY; 2012, 253–264. [ http://doi.acm.org/10.1145/2382196.2382226 ] http://doi.acm.org/10.1145/2382196.2382226 http://doi.acm.org/10.1145/2382196.2382226

Cited by 23 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Intrusion detection system in cloud environment: Literature survey & future research directions;International Journal of Information Management Data Insights;2022-11

2. Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor;2022 IEEE International Conference on Cyber Security and Resilience (CSR);2022-07-27

3. On Tracking Ransomware on the File System;Proceedings of the 8th International Conference on Information Systems Security and Privacy;2022

4. Virtual Machine Introspection in Virtualization: A Security Perspective;2021 Thirteenth International Conference on Contemporary Computing (IC3-2021);2021-08-05

5. A survey on machine learning-based malware detection in executable files;Journal of Systems Architecture;2021-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3