共 25 条
[1]
Algawi A., 2014, ICCSM, P149
[2]
Averbuch A., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P121, DOI 10.1109/ICNSS.2011.6059968
[3]
Truly-Protect: An Efficient VM-Based Software Protection
[J].
IEEE SYSTEMS JOURNAL,
2013, 7 (03)
:455-466
[5]
Bohne L, 2008, BANDORAS BOCHS AUTOM
[6]
Chander A, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, P27, DOI 10.1109/DISCEX.2001.932157
[7]
Chubachi Y., 2010, P 2010 ACM S APPL CO, P214
[10]
Harkema M., 2002, PROC INT WORKSHOP SO, P114