DKSM: Subverting Virtual Machine Introspection for Fun and Profit, 2010 29th IEEE Symposium on Reliable Distributed Systems, pp.82-91, 2010. ,
DOI : 10.1109/SRDS.2010.39
URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/SRDS10.pdf
Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp.1-10, 2011. ,
DOI : 10.1109/SADFE.2011.17
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation, vol.9, pp.90-98, 2012. ,
DOI : 10.1016/j.diin.2012.05.001
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, vol.10, pp.87-95, 2013. ,
DOI : 10.1016/j.diin.2013.06.010
Network forensics: Tapping the internet Available at http://www.oreillynet.com, 2002. ,
Network Forensics for Cloud Computing, In: DAIS, pp.29-42, 2013. ,
DOI : 10.1007/978-3-642-38541-4_3
URL : https://hal.archives-ouvertes.fr/hal-01489462
An integrated conceptual digital forensic framework for cloud computing, Digital Investigation, vol.9, issue.2, pp.71-80, 2012. ,
DOI : 10.1016/j.diin.2012.07.001
A fistful of red-pills: How to automatically generate procedures to detect cpu emulators, Proceedings of the 3rd USENIX Conference on Offensive Technologies. WOOT'09, 2009. ,
The Final Frontier: Confidentiality and Privacy in the Cloud, Computer, vol.44, issue.9, pp.44-50, 2011. ,
DOI : 10.1109/MC.2011.223
A Universal Semantic Bridge for Virtual Machine Introspection, Proceedings of the 7th International Conference on Information Systems Security. ICISS'11, pp.370-373, 2011. ,
DOI : 10.1145/1653662.1653728
Playing ???Hide and Seek??? with Stored Keys, Proceedings of the Third International Conference on Financial Cryptography. FC '99, pp.118-124, 1999. ,
DOI : 10.1007/3-540-48390-X_9
URL : http://www.ncipher.com/products/files/papers/anguilla/keyhide2.pdf
Forensic investigation of cloud computing systems, Network Security, vol.2011, issue.3, pp.2011-2014, 2011. ,
DOI : 10.1016/S1353-4858(11)70024-1