I. Ahmed, A. Zoranic, S. Javaid, G. Richard, and I. , ModChecker: Kernel Module Integrity Checking in the Cloud Environment, 2012 41st International Conference on Parallel Processing Workshops, pp.306-313, 2012.
DOI : 10.1109/ICPPW.2012.46

A. Bassov, Hooking the kernel directly (www.codeproject.com/ Articles/13677/Hooking-the-kernel-directly, 2006.

J. Butler and G. Hoglund, Rootkits: Subverting the Windows Kernel, 2005.

T. Garfinkel and M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, Proceedings of the Network and Distributed System Security Symposium, pp.191-206, 2003.

. Intel, IA-32 Architectures Software Developer's Manuals , Santa Clara, California (www.intel.com/content/www/us/ en/processors/architectures-software-developer-manuals, p.2013

. Kad, Handling the interrupt descriptor table for fun and profit, Phrack, 2002.

G. Kroah-hartman, Signed kernel modules, Linux Journal, vol.2004, issue.117 4, 2004.

P. Loscocco, P. Wilson, J. Pendergrass, and C. Mcdonell, Linux kernel integrity measurement using contextual inspection, Proceedings of the 2007 ACM workshop on Scalable trusted computing , STC '07, pp.21-29, 2007.
DOI : 10.1145/1314354.1314362

. Microsoft, Digital Signatures for Kernel Modules on Windows (msdn.microsoft.com/en-us/library, 2007.

I. Mxatone, Stealth hooking: Another way to subvert the Windows kernel, Phrack, vol.0, issue.00x41, 2008.

W. Oney, Programming the Microsoft Windows Driver Model, 2002.

O. Core, D. Team, O. Cryptography, and S. Toolkit, [14] pragmatic, (Nearly) complete Linux loadable kernel modules: The definitive guide for hackers, virus coders and system administrators, 1999.

J. Rutkowska, System virginity verifier: Defining the roadmap for malware detection in Windows systems, presented at the Hack in the Box Conference, 2005.

D. Sd, Linux on-the-fly kernel patching without LKM, Phrack, 2001.

A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van-doorn et al., Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems, Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, pp.1-16, 2005.
DOI : 10.1007/978-0-387-44599-1_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.9177

S. Skape, Bypassing PatchGuard on Windows x64 (uninformed, 2005.

M. Suiche, IDTGuard v0 Build (www.msuiche. net, 2005.

P. Vmi-tools, LibVMI (code.google.com

V. Project, Volatility Plugin (code.google.com