共 50 条
- [1] NumChecker: Detecting Kernel Control-flow Modifying Rootkits by Using Hardware Performance Counters 2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
- [3] User-level DMA without operating system kernel modification THIRD INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE - PROCEEDINGS, 1997, : 322 - 331
- [4] Fire phoenix cluster operating system kernel and its evaluation 2005 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2006, : 325 - +
- [5] Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux 2017 IEEE/ACM 5TH INTERNATIONAL FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE) PROCEEDINGS, 2017, : 10 - 16
- [6] Using an in-kernel hypervisor to protect the integrity of operating system ICIC Express Letters, 2014, 8 (08): : 2357 - 2363
- [8] PLANNING OF PERIODIC PROCESSING OF INFORMATION IN A SYSTEM OPERATING WITHOUT INTERRUPTIONS ENGINEERING CYBERNETICS, 1973, 11 (03): : 451 - 455
- [9] Using an In-kernel Hypervisor to Protect the Integrity of Operating System 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 94 - 97
- [10] Nekray: A Linux Kernel-Based Customized Operating System for Information Kiosk INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2021, 12 (03): : 49 - 68