[1] |
GARFINKEL T , ROSENBLUM M . A virtual machine introspection based architecture for intrusion detection[A]. Network and Distributed System Security Symposium[C]. 2003.
|
[2] |
JIANG X , WANG X , XU D . Stealthy malware detection through VMM-based “out-of-the-box” semantic view reconstruction[A]. Computer and Communication Security[C]. New York,USA, 2007. 128-138.
|
[3] |
JIANG X , WANG X . Out-of-the-box monitoring of VM-based high-interaction honeypots[A]. Recent Advances in Intrusion Detection[C]. Australia, 2007. 198-218.
|
[4] |
HAY B , NANCE K . Forensics examination of volatile system data using virtual introspection[J]. ACM Sigops OS Review, 2008,42(3): 74-82.
|
[5] |
DOLAN-G B , PAYNE B , LEE W . Leveraging forensic tools for virtual machine introspection[R]. GT-CS-11-05, 2011.
|
[6] |
CHEN P M , NOBLE B . When virtual is better than real[J]. Hot Topics in Operating Systems(HOTOS '01), 2001,8: 133-138.
|
[7] |
JONES S T,A C , ARPACI D , A C , ARPACI D , R H . Antfarm:tracking processes in a virtual machine environment[A]. Proc of the 2006 USENIX Annual Technical Conference[C]. 2006.
|
[8] |
LKCD. Linux Kernel Crash Dump[EB/OL]. .
|
[9] |
康华 .从 VMM 中识别 GUEST OS 中的用户进程[EB/OL]. . KANG H .Identify the user process in GUEST OS from VMM[EB/OL]. .
|
[10] |
PFOH J , SCHNEIDER C , ECKERT C . A formal model for virtual machine introspection[A]. Proceedings of the 2nd Workshop on Virtual Machine Security(VMSec’09)[C]. Chicago,Illinois,USA, 2009. 1-10.
|
[11] |
DOLAN G B , LEEK T , ZHIVICH M . Virtuoso:narrowing the semantic gap in virtual machine introspection[A]. Proceedings of the 33rd IEEE Symposium on Security and Privacy[C]. 2011,32: 297-312.
|
[12] |
FU Y , LIN Z . Space traveling across VM:automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection[A]. Proceedings of the 33rd IEEE Symposium on Security and Privacy[C]. 2012. 586-600.
|
[13] |
The Xen project power[EB/OL]. .
|
[14] |
KVM[EB/OL]. .
|
[15] |
QEMU[EB/OL]. .
|
[16] |
石磊, 邹德清, 金海 . Xen 虚拟化技术[M]. 武汉: 华中科技大学出版社, 2009. SHI L , ZOU D Q , JIN H . Xen Virtualization Technology[M]. Wuhan: Huazhong University of Science and Technology Press, 2009.
|
[17] |
英特尔开源软件技术中心, 复旦大学并行技术处理研究所. 系统虚拟化:原理与实现[M]. 北京: 清华大学出版社, 2009.Intel Open Source Software Technology Center, Parallel Processing Institute,Fudan University. System Virtualization:Principle and Implementation[M]. Beijing: Tsinghua University Press, 2009.
|
[18] |
ROBERT L . Linux Kernel Development[M]. New York: MacMillan Computer PublicationPress, 2005.
|
[19] |
Suterusu[EB/OL]. .
|