共 32 条
[1]
Ahmed I., 2012, 2012 41st International Conference on Parallel Processing Workshops (ICPPW 2012), P306, DOI 10.1109/ICPPW.2012.46
[2]
[Anonymous], 2003, P NETW DISTR SYST SE
[3]
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
[J].
2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010,
2010,
:82-91
[4]
Chen PM, 2001, EIGHTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, P133
[5]
CURRY TW, 1994, PROCEEDINGS OF THE SUMMER 1994 USENIX CONFERENCE, P267
[6]
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51
[7]
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:297-312
[9]
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:586-600
[10]
Fu Yangchun., 2014, Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC'14, P85