共 20 条
[11]
Haeberlen A., 2010, P IN 9 USENIX S OP S
[13]
Pal Singh J., 1992, Computer Architecture News, V20, P5, DOI 10.1145/130823.130824
[14]
Lares: An architecture for secure active monitoring using virtualization
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:233-247
[15]
Sharif M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P477
[16]
Srivastava A, 2011, LECT NOTES COMPUT SC, V6739, P214, DOI 10.1007/978-3-642-22424-9_13
[17]
Szefer J, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P401
[18]
[王丽娜 Wang Lina], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P1534
[19]
Wang Z, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P545
[20]
Woo S. C., P 22 ANN INT S COMP, P24