Author:
Shi Jiangyong,Yang Yuexiang,Tang Chuan
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference49 articles.
1. Anati I, Gueron S, Johnson S, Scarlata V (2013) Innovative technology for cpu based attestation and sealing. In: Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, vol 13
2. Azab AM, Ning P, Wang Z, Jiang X, Zhang X, Skalsky NC (2010) Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, New York, pp 38–49
3. Bahram S, Jiang X, Wang Z, Grace M, Li J, Srinivasan D, Rhee J, Xu D (2010) Dksm: subverting virtual machine introspection for fun and profit. In: 2010 29th IEEE symposium on reliable distributed systems. IEEE, New York, pp 82–91
4. Bharadwaja S, Sun W, Niamat M, Shen F (2011) Collabra: a xen hypervisor based collaborative intrusion detection system. In: 2011 eighth international conference on information technology: new generations (ITNG). IEEE, New York, pp 695–700
5. Carbone M, Kataria A, Rugina R, Thampi V (2014) Vprobes: deep observability into the esxi hypervisor. VMware Tech J 14(5):35–42
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献