CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring

作者: Ralf Hund , Carsten Willems , Thorsten Holz

DOI:

关键词:

摘要:

参考文章(50)
Jonas Pfoh, Christian Schneider, Claudia Eckert, Nitro: Hardware-Based System Call Tracing for Virtual Machines Advances in Information and Computer Security. pp. 96- 112 ,(2011) , 10.1007/978-3-642-25141-2_7
Tal Garfinkel, Keith Adams, Jason Franklin, Andrew Warfield, Compatibility is not transparency: VMM detection myths and realities HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems. pp. 6- ,(2007)
Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee, Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection Research in Attacks, Intrusions, and Defenses. pp. 22- 41 ,(2012) , 10.1007/978-3-642-33338-5_2
Owen S. Hofmann, Brent Waters, Alan M. Dunn, Emmett Witchel, Cloaking malware with the trusted platform module usenix security symposium. pp. 26- 26 ,(2011)
Thomas Raffetseder, Christopher Kruegel, Engin Kirda, Detecting System Emulators Lecture Notes in Computer Science. pp. 1- 18 ,(2007) , 10.1007/978-3-540-75496-1_1
Wenke Lee, Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Impeding Malware Analysis Using Conditional Code Obfuscation network and distributed system security symposium. pp. 1- 13 ,(2008)
Wenke Lee, Monirul I. Sharif, Andrea Lanzi, K-Tracer: A System for Extracting Kernel Malware Behavior. network and distributed system security symposium. ,(2009)
Chengyu Song, Paul Royal, Wenke Lee, Impeding automated malware analysis with environment-sensitive malware usenix conference on hot topics in security. pp. 4- 4 ,(2012)
Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti, Detecting Environment-Sensitive Malware Lecture Notes in Computer Science. pp. 338- 357 ,(2011) , 10.1007/978-3-642-23644-0_18
Deepa Srinivasan, Xuxian Jiang, Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 209- 226 ,(2012) , 10.1007/978-3-642-31909-9_12