[1] BRUNDRETT P, GARG P, GU J, et al. Encrypting file system and method: U.S. 6249866B1 [P]. 2001-06-19. [2] LAM K C, LAU W C, YUE O. Hitchbot-delivering malicious URLs via social hitch-hiking[C]//GLOBECOM 2011: Proceedings of the 2011 Global Telecommunications Conference. Piscataway, NJ: IEEE Press, 2011: 1-6. [3] 任建华,江国华.终端文件安全保障系统中剪贴板监控技术的应用[J].计算机应用,2005,25(Z2):86-88. (REN J H, JIANG G H. Application of the technology of the clipboard monitoring in the terminal file security system[J]. Journal of Computer Applications, 2005, 25(Z2): 86-88.) [4] LI S, LV S, JIA X, et al. Application of clipboard monitoring technology in graphic and document information security protection system[C]//IITSI '10: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. Washington, DC: IEEE Computer Society, 2010: 423-426. [5] PARK C, KIM H. System and method for clipboard security: U.S., 20120226913A1 [P]. 2010-02-02. [6] PATHAK G, TAK G K. Implementation of clipboard security using cryptographic techniques[J]. International Journal of Computer Applications, 2014, 86(6): 1-5. [7] OKOLICA J, PETERSON G L. Extracting the windows clipboard from physical memory[J]. Digital Investigation, 2011, 8(Supplement): S118-S124. [8] BRADBURY D. Microsoft's new window on security[J]. Computers & Security, 2006, 25(6): 405-407. [9] 熊海泉,刘志勇,徐卫志,等.VMM中Guest OS非陷入系统调用指令截获与识别[J].计算机研究与发展,2014,51(10):2348-2359. (XIONG H Q, LIU Z Y, XU W Z, et al. Interception and identification of guest OS non-trapping system call instruction within VMM[J]. Journal of Computer Research and Development, 2014, 51(10): 2348-2359.) [10] PROSNITZ B. Blackbox no more: reconstruction of internal virtual machine state [EB/OL]. (2007-03-26) [2013-03-21]. http://www.cs.northwestern.edu/~plab/Virtuoso/NWU-EECS-07-01.pdf. [11] FATTORI A, LANZI A, BALZAROTTI D, et al. Hypervisor-based malware protection with AccessMiner[J]. Computers & Security, 2015, 52: 33-50. [12] PFOH J, SCHNEIDER C, ECKERT C. Nitro: hardware-based system call tracing for virtual machines[C]//IWSEC 2011: Proceedings of the 6th International Workshop on Advances in Information and Computer Security, LNCS 7038. Berlin: Springer-Verlag, 2011: 96-112. [13] DINABURG A, ROYAL P, SHARIF M, et al. Ether: malware analysis via hardware virtualization extensions[C]//CCS'08: Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008: 51-62. |