[17] |
SHAWN E , SHERRI S , CLIFF Z . SMM rootkits:a new breed of OS independent malware[C]//Security and privacy in communica-tion networks. 2008.
|
[18] |
JONATHAN M M , BRYAN J P , ADRIAN P , et al. Flicker:an execution infrastructure for TCB minimization[C]//ACM European Conference on Computer Systems. 2008.
|
[19] |
JONATHAN M M , LI Y L , QU N , et al. TrustVisor:efficient TCB reduction and attestation[J]. IEEE Symposium on Security & Pri-vacy, 2010,41(3): 143-158.
|
[20] |
NICK L P J , TIMOTHY F , JESUS M , et al. Copilot — a coproces-sor-based kernel runtime integrity monitor[J]. Proceedings of Usenix Security Symposium, 2010,(13): 179-194.
|
[21] |
ZHANG F W , KEVIN L , ANGELOS S , et al. Using hardware features for increased debugging transparency[C]//IEEE Sympo-sium on Security and Privacy. 2015.
|
[22] |
AHMED M A , NING P , WANG Z , et al. HyperSentry:enabling stealthy incontext measurement of hypervisor integrity[J]. ACM Conference on Computer and Communications Security, 2010:38-49.
|
[1] |
周振柳, 栾好利, 张楠 , 等. 基于动态安全属性保护的可信固件[J]. 计算机工程, 2011,37(4):137-139.
|
|
ZHOU Z L , LUAN H L , ZHANG N , et al. Trusted firmware based on dynamic security attribute protection[J]. Computer Engineering, 2011,37(4):137-139.
|
[2] |
李博, 李建欣, 胡春明 , 等. 基于VMM层系统调用分析的软件完整性验证[J]. 计算机研究与发展, 2011,48(8):1438-1446.
|
|
LI B , LI J X , HU C M . oftware integrity verification based on VMM-Level system call analysis technique[J]. Journal of Com-puter Research and Development, 2011,48(8):1438-1446.
|
[3] |
严飞, 石翔, 李志华 , VirtinSpector:一种基于 UEFI 的虚拟机动态安全度量框架设计与实现[J]. 四川大学学报, 2014,46(1):22-28.
|
|
YAN F , SHI X , LI Z H , et al. VirtinSpector:a UEFI based dynamic secure measurement framework for virtual machine[J]. Journal of Sichuan University, 2014,46(1):22-28.
|
[4] |
Intel. Intel? 64 and IA-32 architectures software developer man-ual[M]. Intel Press, 2014.
|
[5] |
Unified extensible firmware interface specification[EB/OL]. .
|
[6] |
Coreboot[EB/OL]. .
|
[7] |
VINCENT Z , MICHAEL R , SURESH M . Beyond BIOS develop-ing with the uenified extensible firmware interface[M]. Intel Press, 2010.
|
[8] |
Handling interrupt descriptor table for fun and profit[EB/OL]. .
|
[9] |
Hijacking the linux kernel[EB/OL]. .
|
[10] |
FU Y , LIN Z . Space traveling across VM:automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection[C]//IEEE Symposium on Security and Privacy. 2012.
|
[11] |
BRENDAN D G , TIM L , MICHAEL Z , et al. Virtuoso:narrowing the semantic gap in virtual machine introspection[C]//IEEE Sym-posium on Security and Privacy. 2011.
|
[12] |
LIONEL L , HORACIO A L C , DAVID L . Hypervisor support for identifying covertly executing binaries[C]//Usenix Security Sym-posium. 2008.
|
[13] |
BRYAN D P , MARTIM D P D A C , WENKE L . Secure and flexible monitoring of virtual machines[C]//The Annual Computer Security Applications Conference. 2007.
|
[14] |
Following the white rabbit:Software Attacks against Intel VT-d[EB/OL]. .
|
[15] |
KUN S , WANG J , ZHANG F W , et al. SecureSwitch:BIOS-assisted isolation and switch between trusted and untrusted commodity OSes[C]//Network&Distributed System Security Symposium. 2012.
|
[16] |
KOSTYA K . Cloudburst:a vMware guest to host escape[C]//Blackhat Talk. 2009.
|