[1] |
MCCUNE J , PARNO B , PERRIG A , et al. Minimal TCB code execu-tion[A]. Proc of IEEE Symposium on Security and Privacy[C]. 2007.267-272.
|
[2] |
MCCUNE J , PARNO B , PERRIG A , et al. An execution infrastructure for TCB minimization[A]. Proc of Eurosys[C]. 2008.
|
[3] |
MCCUNE J , LI Y , QU N , et al. TrustVisor:efficient TCB reduction and attestation[A]. Proc of IEEE Symposium on Security and Pri-vacy[C]. 2010.143-158.
|
[4] |
SANDHU R S . On five definitions of data integrity[A]. Proc of the 7th IFIP WG 11.3 Working Conference on Database Security[C]. 1993.257-268.
|
[5] |
Department of Defense,USA. Trusted Computer System Evaluation Criteria,TCSEC[S]. 1985.
|
[6] |
Trusted Computing Group. TPM Main Specification Level 2,Revision 116[EB/OL]. .
|
[7] |
HOFMANN O , KIM S , DUNN A , et al. Inktag:secure applications on an untrusted operating system[A]. Proc of the 18th International Con-ference on Architectural Support for Programming Languages and Operating Systems,ASPLOS 2013[C]. 2013.253-264.
|
[8] |
WANG Z , WU C , GRACE M , et al. Isolating commodity hosted hypervisors with hyperlock[A]. Proc of Eurosys[C]. 2010.127-140.
|
[9] |
CRISWELL J , DAUTENHAHN N , ADVE V . Virtual ghost:protecting applications from hostile operating systems[A]. Proc of the 19th In-ternational Conference on Architectural Support for Programming Languages and Operating Systems,ASPLOS 2014[C]. 2014.81-96.
|
[10] |
SAILER R , ZHANG X , JAEGER T , VAN DOORN L . Design and implementation of a TCG-based integrity measurement architecture[A]. Proc of the 13th USENIX Security Symposium[C]. 2004.16.
|
[11] |
KIL C , SEZER E , AZAB A , NING P , ZHANG X . Remote attestation to dynamic system properties:towards providing complete system in-tegrity evidence[A]. Proc of the 39th International Conference on De-pendable Systems and Networks[C]. 2009.
|
[12] |
ZHANG F , CHEN H B . Security-preserving live migration of virtual machines in the cloud[J]. Journal of Network and Systems Manage-ment, 2013,21(4): 562-587.
|
[13] |
AZAB A , NING P , WANG Z , et al. HyperSentry:enabling stealthy in-context measurement of hypervisor integrity[A]. Proc of the 17th Con-ference on Computer and Communications Security[C]. 2010.38-49.
|
[14] |
AZAB A , NING P , SEZER E , et al. A hypervisor-based integrity measurement agent[A]. Proc of the Annual Computer Security Appli-cations Conference[C]. 2009.461-470.
|
[15] |
DAVI L , SADEGHI A , WINANDY M . Dynamic.integrity measure-ment and attestation:towards defense against return-oriented pro-gramming attacks[A]. Proc of the 2009 ACM Workshop on Scalable Trusted Computing[C]. 2009.49-54.
|
[16] |
LIU Z , LEE J , ZENG J , et al. CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM[A]. Proc of The 40th In-ternational Symposium on Computer Architecture[C]. 2013.392-403.
|
[17] |
SAILER R , ZHANG X , JAEGER T , et al. Design and implementation of a TCG-based integrity measurement architecture[A]. Proc of the 13th Usenix Security Symposium[C]. 2004.
|
[18] |
WANG Z , JIANG X X . Hypersafe:a lightweight approach to provide lifetime hypervisor control-flow integrity[A]. Proc of IEEE Sympo-sium on Security and Privacy[C]. 2010.
|
[19] |
CLARK C , FRASER K , HAND S , et al. Live migration of virtual machines[A]. Proc of the 2nd Symposium on Networked Systems De-sign and Implementation[C]. 2005.
|
[20] |
JO C , GUSTAFSSON E , SON J , et al. Efficient live migration of virtual machines using shared storage[A]. Proc of the 9th Annual International Conference on Virtual Execution Environments[C]. 2013.41-50.
|
[21] |
SONG X , SHI J C , LIU R , et al. Parallelizing live migration of virtual machines[A]. Proc of the 9th Annual International Conference on Virtual Execution Environments[C]. 2013.85-96.
|
[22] |
TAKEMURA C , CRAWFORD L . The Book of Xen:A Practical Guide for the System Administrator[A]. No Starch Press, 2009.
|
[23] |
Xen Project.[EB/OL] .
|
[24] |
WANG Z , JIANG X X , CUI W D , et al. Countering kernel rootkits with lightweight hook protection[A]. Proc of the 16th ACM Conference on Computer and Communications Security[C]. 2009.
|