Xen and the Art of Virtualization, 19th ACM Symposium on Operating Systems Principles, pp.164-177, 2003. ,
NOVA, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.209-222 ,
DOI : 10.1145/1755913.1755935
Binyu zang: CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization, SOSP '11 Proceedings of the 23th ACM Symposium on Operating Systems Principles, pp.203-216, 2011. ,
Breaking up is hard to do, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.189-202, 2011. ,
DOI : 10.1145/2043556.2043575
Jha: A Trusted Virtual Machine in an Untrusted Management Environment, 3rd IEEE International Conference on Cloud Computing, pp.172-179, 2010. ,
Ports: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Feifei Wang ,
Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009. ,
DOI : 10.1145/1653662.1653728
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928
Protecting Xen Hypercalls Intrusion Detection/Prevention in a Virtualized Environment, 2009. ,
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212 ,
DOI : 10.1145/1653662.1653687
Shamon: A System for Distributed Mandatory Access Control, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.23-32 ,
DOI : 10.1109/ACSAC.2006.47
Terra: A Virtual Machine-Based Platform for Trusted Computing, 19th Symposium on Operating System Principles ,
The RC4 Encryption Algorithm, 1992. ,
On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004. ,
DOI : 10.1145/1030083.1030124
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.30
Enforcing Performance Isolation Across Virtual Machines in Xen, Proceedings of the 7th International Middleware Conference, 2006. ,
DOI : 10.1145/956993.956995
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.5024
Evolution in kernel debugging using hardware virtualization with xen, Proceedings of the 2006 Ottawa Linux Symposium, 2006. ,