共 15 条
[1]
Abadi Martin, 2005, P 12 ACM C COMP COMM, P340
[2]
Lurking in the shadows: Identifying systemic threats to kernel data (Short paper)
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:246-+
[3]
BIENIA C., 2008, TR81108 PRINC U
[4]
Chen S., 2005, P 14 C USENIX SEC S, V5
[5]
Cui Weidong., 2012, USENIX SECURITY, P42
[6]
Garfinkel T., 2003, NDSS, V3
[9]
Mao Y., 2014, INF NETW SEC ICINS 2, P185
[10]
Payne Bryan, LIBVMI VIRTUAL MACHI