共 37 条
[1]
[Anonymous], 2007, P LINUX S DTTAW DNTO
[2]
[Anonymous], 2009, Proceedings of the 18th USENIX Security Symposium
[3]
[Anonymous], 2003, P NETW DISTR SYST SE
[4]
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
[J].
2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010,
2010,
:82-91
[5]
Bishop M., 1989, Proceedings of the 5th Annual Computer Security Applications Conference, P46
[6]
Assessment and Improvement of Hang Detection in the Linux Operating System
[J].
2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS,
2009,
:288-294
[7]
Criswell John, 2007, Operating Systems Review, V41, P351, DOI 10.1145/1323293.1294295
[8]
Criswell John., 2009, Proceedings of the 18th USENIX Security Symposium, Security'09, P83
[9]
Demme J., 2013, ACM SIGARCH computer architecture news, V41, P559, DOI 10.1145/2485922
[10]
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51