[1] |
冯登国, 秦宇, 汪丹 ,等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349.
|
|
FENG D G , QIN Y , WANG D ,et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8): 1332-1349.
|
[2] |
BERGER S , CáCERES R , GOLDMAN K A ,et al. vTPM:virtualizing the trusted platform module[C]// The 15th Conference on USENIX Security Symposium. 2006: 305-320.
|
[3] |
STUMPF F , TAFRESCHI O , R?DER P , ,et al. A robust integrity reporting protocol for remote attestation[C]// The 2nd Work shop on Advances in Trusted Computing. Tokey,Japan, 2006.
|
[4] |
PARNO B , . Bootstrapping trust in a trusted platform[C]// The USENIX Workshop on Hot Topics in Security. 2008.
|
[5] |
冯伟, 冯登国 . 基于串空间的可信计算协议分析[J]. 计算机学报, 2015,38(4): 701-706.
|
|
FENG W , FENG D G . Analyzing trusted computing protocol based on the strand space model[J]. Chinese Journal of Computers, 2015,38(4): 701-706.
|
[6] |
FINK R A , SHERMAN A T , MITCHELL A O ,et al. Catching the cuckoo:verifying TPM proximity using a quote timing side- channel[C]// The Trust and Trustworthy Computing. 2011: 294-301.
|
[7] |
COKER G , GUTTMAN J , LOSCOCCO P ,et al. Principles of remote attestation[C]// The International Journal of Information Security. 2010: 63-81.
|
[8] |
BERGER S , GOLDMAN K , PENDARAKIS D ,et al. Scalable attestation:a step toward secure and trusted clouds[C]// The IEEE International Conference on Cloud Engineering. 2015: 185-194.
|
[9] |
ZHANG T,B , LEE R , . Cloud Monatt:an architecture for security health monitoring and attestation of virtual machines in cloud computing[C]// The IEEE 42nd Annual International Symposium on Computer Architecture (ISCA). 2015: 362-374.
|
[10] |
LAUER H , KUNTZE N . Hypervisor-based attestation of virtual environments[C]// The Ubiquitous Intelligence Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress. 2016: 333-340.
|
[11] |
GARFINKEL T , ROSENBLUM M . A Virtual machine introspection based architecture for intrusion detection[C]// The Network and Distributed Systems Security Symposium. 2003: 191-206.
|
[12] |
李保珲, 方滨兴, 徐克付 ,等. 虚拟机自省技术研究与应用进展[J]. 软件学报, 2016,27(6): 1384-1401.
|
|
LI B H , FANG B X , XU K F ,et al. Research and application progress of virtual machine introspection technology[J]. Journal of Software, 2016,27(6): 1384-1401.
|
[13] |
彭春洪 . 基于KVM虚拟机的恶意行为检测系统设计与实现[D]. 成都:电子科技大学, 2015.
|
|
PENG C H . The design and implementation of the malicious behavior detecting system based on KVM virtual machine[D]. Chengdu:University of Electronic Science and Technology of China, 2015.
|
[14] |
DUFLOT L , LEVILLAIN O , MORIN B . ACPI:design principles and concerns[C]// The 2nd International Conference on Trusted Computing. 2009: 14-28.
|
[15] |
HENDERSON A , YIN H , HAN H ,et al. VDF:targeted evolutionary fuzz testing of virtual devices[C]// The International Symposium on Research in Attacks,Intrusions,and Defenses. 2017: 3-25.
|