P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the Art of Virtualization, 19th ACM Symposium on Operating Systems Principles, pp.164-177, 2003.

U. Steinberg and B. Kauer, NOVA, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.209-222
DOI : 10.1145/1755913.1755935

F. Zhang, J. Chen, and H. Chen, Binyu zang: CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization, SOSP '11 Proceedings of the 23th ACM Symposium on Operating Systems Principles, pp.203-216, 2011.

P. Colp, M. Nanavati-zhu, W. Aiello, G. Coker, T. Deegan et al., Breaking up is hard to do, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.189-202, 2011.
DOI : 10.1145/2043556.2043575

C. Li, A. Raghunathan, and K. Niraj, Jha: A Trusted Virtual Machine in an Untrusted Management Environment, 3rd IEEE International Conference on Cloud Computing, pp.172-179, 2010.

X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger et al., Ports: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Feifei Wang

Z. Wang, X. Jiang, W. Cui, and P. Ning, Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009.
DOI : 10.1145/1653662.1653728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Hoang, Protecting Xen Hypercalls Intrusion Detection/Prevention in a Virtualized Environment, 2009.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212
DOI : 10.1145/1653662.1653687

J. M. Mccune, T. Jaeger, S. Berger, R. Caceres, and R. Sailer, Shamon: A System for Distributed Mandatory Access Control, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.23-32
DOI : 10.1109/ACSAC.2006.47

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, Terra: A Virtual Machine-Based Platform for Trusted Computing, 19th Symposium on Operating System Principles

R. L. Rivest, The RC4 Encryption Algorithm, 1992.

H. Shacham, M. Page, B. Pfaff, N. Modadugu, and D. Boneh, On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004.
DOI : 10.1145/1030083.1030124

Z. Wang and X. Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.30

D. Gupta, L. Cherkasova, R. Gardner, and A. Vahdat, Enforcing Performance Isolation Across Virtual Machines in Xen, Proceedings of the 7th International Middleware Conference, 2006.
DOI : 10.1145/956993.956995

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. A. Kamble, J. Nakajima, and A. K. Mallick, Evolution in kernel debugging using hardware virtualization with xen, Proceedings of the 2006 Ottawa Linux Symposium, 2006.