[1] 王惠莅,杨晨,杨建军.美国NIST云计算安全标准跟踪及研究[J].信息技术与标准化,2012(6):51-54. (WANG H L, YANG C, YANG J J. Research on clouds computing security standards of NIST[J]. Information Technology & Standardization, 2012(6):51-54.) [2] 张瑞,刘威.2015年12月计算机病毒疫情分析[J].信息网络安全,2016(2):74. (ZHANG R, LIU W. Analysis of epidemic situation of computer virus in December 2015[J]. Netinfo Security, 2016(2):74.) [3] 陈兴蜀,葛龙,罗永刚,等.云计算服务持续监管研究[J].网络与信息安全学报,2016,2(10):2-3. (CHEN X S, GE L, LUO Y G, et al. Research on continuous monitoring of cloud computing service[J]. Chinese Journal of Network and Information Security, 2016, 2(10):2-3.) [4] 徐江峰,邵向阳.基于HOOK API技术的进程监控系统设计与实现[J].计算机工程与设计,2011,32(4):1330-1332. (XU J F, SHAO X Y. Design and realization of process-monitoring system based on HOOK API technology[J]. Computer Engineering and Design, 2011, 32(4):1330-1332.) [5] 崔竞松,张雅娜,郭迟,等.支持多种虚拟化技术的进程非代理监控方法[J]. 华中科技大学学报(自然科学版),2014,42(11):122-124. (CUI J S, ZHANG Y N, GUO C, et al. Agent-free processes monitoring method supporting various virtualization technologies[J]. Journal of Huazhong University of Science and Technology (Nature Science Edition), 2014, 42(11):122-124.) [6] 李博,沃天宇,胡春明,等.基于VMM的操作系统隐藏对象关联检测技术[J].软件学报,2013, 24(2):405-420. (LI B, WO T Y, HU C M, et al. Hidden OS objects correlated detection technology based on VMM[J]. Journal of Software, 2013, 24(2):405-420.) [7] 张磊,陈兴蜀,任益,等.一种基于VMM的内核级Rootkit检测技术[J].信息网络安全,2015(4):57-59. (ZHANG L, CHEN X S, REN Y, et al. Kernel-level Rootkit detection technology based on VMM[J]. Netinfo Security, 2015(4):57-59.) [8] HWANG T, SHIN Y, SON K, et al. Design of a hypervisor-based rootkit detection method for virtualized systems in cloud computing environments[C]//Proceedings of the 2013 AASRI Winter International Conference on Engineering and Technology. Amsterdam:Atlantis Press, 2013:27-33. [9] GARFINKEL T, ROSENBLUM M. A virtual machine introspection based architecture for intrusion detection[C]//Proceedings of the Internet Society's 2003 Symposium on Network and Distributed Systems Security Symposium.[S.l.]:Internet Society, 2003:253-285. [10] 骆源,毛亚强,廖振壹.一种用于虚拟机上的混合监控度量方法及系统:中国,CN104714877A[P]. 2015-06-17. [11] 孙绍钢,李晓勇.一种基于虚拟化技术的恶意代码行为检测方法:中国,CN102682229A[P]. 2012-09-19. [12] 林杰,刘川意,方滨兴.IVirt:基于虚拟机自省的运行环境完整性度量机制[J].计算机学报,2015,38(1):191-203. (LIN J, LIU C Y, FANG B X. IVirt:runtime environment integrity measurement mechanism based on virtual machine introspection[J]. Chinese Journal of Computers, 2015, 38(1):191-203.) [13] AZAB A M, NING P, SEZER E C, et al. HIMA:a hypervisor-based integrity measurement agent[C]//ACSAC'09:Proceedings of the 2009 IEEE Annual Computer Security Applications Conference. Piscataway, NJ:IEEE, 2009:461-470. [14] GARFINKEL T, PFAFF B, CHOW J, et al. Terra:a virtual machine-based platform for trusted computing[C]//SOSP'03:Proceedings of the 19th ACM Symposium on Operating Systems Principles. New York:ACM, 2003:193-206. [15] 陈兴蜀,李辉,张磊,等.基于Xen的自下而上调用的设计与实现[J].电子科技大学学报,2014,43(6):881-884. (CHEN X S, LI H, ZHANG L, et al. The design and implement of Xen-based upcall[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(6):881-884.) [16] SAILER R, ZHANG X, JAEGER T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//SSYM'04:Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley, CA:USENIX Association, 2004, 13:223-238. [17] JAEGER T, SAILER R, SHANKAR U. PRIMA:Policy-Reduced Integrity Measurement Architecture[C]//SACMAT 2006:Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2006:19-28. [18] HUH J H, MONTANARI M, DAGIT D, et al. An empirical study on the software integrity of virtual appliances:are you really getting what you paid for?[C]//ASIA CCS'13:Proceedings of the 2013 ACM SIGSAC Symposium on Information, Computer and Communications Security. New York:ACM, 2013:231-242. [19] STELTE B, KOCH R, ULLMANN M. Towards integrity measurement in virtualized environments-a hypervisor based sensory integrity measurement architecture (SIMA)[C]//HST'10:Proceedings of the 2010 IEEE International Conference on Technologies for Homeland Security. Piscataway, NJ:IEEE, 2010:106-112. [20] ALI S. Virtualization with KVM[M]//Practical Linux Infrastructure. Berkeley, CA:Apress, 2015:53-80. [21] Intel. Intel 64 and IA-32 architectures software developer's manual[EB/OL].[2017-05-06]. http://www.ti.uni-bielefeld.de/html/teaching/WS1314/techinf1/64-ia-32-architectures-software-developers-manual.pdf. [22] 邓志.处理器虚拟化[M].北京:电子工业出版社,2014:200-201. (DENG Z. Processor virtualization[M]. Beijing:Publishing House of Electronics Industry, 2014:200-201.) [23] LI N, LI B, LI J, et al. vMON:An efficient out-of-VM process monitor for virtual machines[C]//HPCC_EUC 2013:Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. Piscataway, NJ:IEEE, 2013:1366-1373. [24] 英特尔开源软件技术中心,复旦大学并行处理研究所. 系统虚拟化——原理与实现[M].北京:清华大学出版社,2009:51-54. (Intel Open Source Technology Center,Parallel Processing Institution of Fudan University. System Virtualization:Principles and Implementation[M]. Beijing:Tsinghua University Press, 2009:51-54.) |