共 34 条
- [1] Virtual Machine Forensics by Means of Introspection and Kernel Code Injection PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 294 - 299
- [2] K-binID: Kernel Binary Code Identification for Virtual Machine Introspection 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 107 - 114
- [3] Memory Forensics Using Virtual Machine Introspection for Malware Analysis 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 518 - 519
- [4] Memory Dump and Forensic Analysis Based on Virtual Machine 2014 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION (IEEE ICMA 2014), 2014, : 1773 - 1777
- [5] Introspection of Virtual Machine Memory Resource in the Virtualized Systems 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2019, : 64 - 67
- [6] Enhancing Virtual Machine Introspection-based Memory Analysis with Event Triggers 2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 133 - 136
- [7] Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory 2014 20TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA-20), 2014, : 416 - 427
- [8] Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection INFORMATION SECURITY (ISC 2013), 2015, 7807 : 3 - 19
- [9] A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
- [10] Source code arrangement of embedded Java']Java virtual machine for NAND flash memory 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 152 - 157