共 32 条
- [1] Ahmed I., 2012, 2012 41st International Conference on Parallel Processing Workshops (ICPPW 2012), P306, DOI 10.1109/ICPPW.2012.46
- [2] [Anonymous], 2003, P NETW DISTR SYST SE
- [3] DKSM: Subverting Virtual Machine Introspection for Fun and Profit [J]. 2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 82 - 91
- [4] Chen PM, 2001, EIGHTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, P133
- [5] CURRY TW, 1994, PROCEEDINGS OF THE SUMMER 1994 USENIX CONFERENCE, P267
- [6] Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51
- [7] Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 297 - 312
- [9] Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 586 - 600
- [10] Fu Yangchun., 2014, Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC'14, P85