A. Baliga, V. Ganapathy, and L. Iftode, Detecting kernel-level rootkits using data structure invariants. Dependable and Secure Computing, IEEE Transactions on, vol.8, pp.670-684, 2011.
DOI : 10.1109/tdsc.2010.38

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.1576

E. Buchanan, R. Roemer, H. Shacham, and S. Savage, When good instructions go bad, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.27-38, 2008.
DOI : 10.1145/1455770.1455776

M. Tzi-cker-chiueh, M. Conover, B. Lu, and . Montague, Stealthy deployment and execution of in-guest kernel agents, Proceedings of the Black Hat USA Security Conference, 2009.

J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve, Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp.351-366, 2007.
DOI : 10.1145/1323293.1294295

P. Dewan, D. Durham, H. Khosravi, M. Long, and G. Nagabhushan, A hypervisor-based system for protecting software runtime memory and persistent storage, SpringSim '08: Proceedings of the 2008 Spring simulation multiconference, pp.828-835, 2008.

F. Gadaleta, N. Nikiforakis, Y. Younan, and W. Joosen, Hello rootKitty: A Lightweight Invariance-Enforcing Framework, ISC, pp.213-228, 2011.
DOI : 10.1007/978-3-642-14215-4_1

URL : http://arxiv.org/abs/1405.5651

F. Gadaleta, Y. Younan, B. Jacobs, W. Joosen, E. De-neve et al., Instruction-level countermeasures against stack-based buffer overflow attacks, Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, VDTS '09, pp.7-12, 2009.
DOI : 10.1145/1518684.1518686

URL : https://lirias.kuleuven.be/bitstream/123456789/229982/1/qemu_retaddr_countm.pdf

R. Hund, T. Holz, and F. C. Freiling, Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, SSYM'09: Proceedings of the 18th conference on USENIX security symposium, pp.383-398, 2009.

Y. Lee, S. Rahimi, and S. Harvey, A Pre-Kernel Agent Platform for security assurance, 2011 IEEE Symposium on Intelligent Agent (IA), pp.1-7, 2011.
DOI : 10.1109/IA.2011.5953619

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.4407

L. Mcvoy and C. Staelin, LMbench: Portable tools for performance analysis, Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, pp.23-39, 1996.

N. Nikiforakis, M. Balduzzi, S. Van-acker, W. Joosen, and D. Balzarotti, Exposing the lack of privacy in file hosting services, Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats (LEET), 2011.

N. L. Petroni, . Jr, F. Timothy, M. Jesus, A. William et al., Copilot -a coprocessor-based kernel runtime integrity monitor, Proceedings of the 13th USENIX Security Symposium, pp.13-13, 2004.

. Qubesos, Architecture Specification

R. Riley, X. Jiang, and D. Xu, Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing, RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.48-67, 2008.
DOI : 10.1007/978-3-540-87403-4_1

A. Seshadri, M. Luk, N. Qu, and A. Perrig, SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes, Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pp.335-350, 2007.

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa et al., BitVisor, Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '09, pp.121-130, 2009.
DOI : 10.1145/1508293.1508311

Z. Wang, X. Jiang, W. Cui, and P. Ning, Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009.
DOI : 10.1145/1653662.1653728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928

P. Heng-yin, S. Poosankam, D. Hanna, and . Song, HookScout: Proactive binary-centric hook detection, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.1-20, 2010.