[1] PÉK G, BUTTYÁN L, BENCSÁTH B. A survey of security issues in hardware virtualization [J]. ACM Computing Survey, 2013, 45(3): Article 40. [2] CHAWLA S, NIGAM A, DOKE P, et al. A survey of virtualization on mobiles [C]//ACC 2011:Proceedings of the First International Conference on Advances in Computing and Communications, Communications in Computer and Information Science, LNCS 191. Berlin: Springer, 2011: 430-441. [3] PAYNE B D, de CARBONE M D P, LEE W. Secure and flexible monitoring of virtual machines [C]//ACSAC 2007: Proceedings of the Twenty-Third Annual Computer Security Applications Conference. Piscataway: IEEE, 2007: 385-397. [4] PAYNE B D. Simplifying virtual machine introspection using LibVMI, SAND2012-7818 [R/OL]. [2014-12-01]. http://prod.sandia.gov/techlib/access-control.cgi/2012/127818.pdf. [5] HIZVER J, CHIUEH T. Real-time deep virtual machine introspection and its applications [C]//VEE 2014: Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York: ACM, 2014: 3-14. [6] XIA Y, LIU Y, CHEN H. Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks [C]//HPCA 2013: Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture. Piscataway: IEEE, 2013: 246-257. [7] SHAW A L, BORDBAR B, SAXON J, et al. Forensic virtual machines: dynamic defence in the cloud via introspection [C]//IC2E 2014: Proceedings of the 2014 IEEE International Conference on Cloud Engineering. Piscataway: IEEE, 2014: 303-310. [8] HARRISON K, BORDBAR B, ALI S T T, et al. A framework for detecting malware in cloud by identifying symptoms [C]//EDOC 2012: Proceedings of the 2012 IEEE 16th International Enterprise Distributed Object Computing Conference. Piscataway: IEEE, 2012: 164-172. [9] GUTTMAN B, ROBACK E A. An introduction to computer security: the NIST handbook [R]. Gaithersburg: National Institute of Standards and Technology, 1995. [10] SINGARAVELU L, PU C, HARTIG H, et al. Reducing TCB complexity for security-sensitive applications: Three case studies [J]. ACM SIGOPS Operating Systems Review, 2006, 40(4): 161-174. [11] POPURI S. A tour of the Mini-OS kernel [EB/OL]. [2014-12-01]. http://www. cs. uic. edu/~ spopuri/minios. html. [12] PALEARI R, MARTIGNONI L, ROGLIA G F, et al. A fistful of red-pills: how to automatically generate procedures to detect CPU emulators [C]//WOOT 2009: Proceedings of the 3rd USENIX Conference on Offensive Technologies. Berkeley: USENIX Association, 2009: 2-2. [13] RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds [C]//CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM, 2009:199-212. [14] CHISNALL D. The definitive guide to the Xen hypervisor [M]. Upper Saddle River: Pearson Education, 2008: 59-74. [15] COKER G. Xen security modules (XSM) [EB/OL]. [2014-12-01]. http://mail.xen.org/files/summit_3/coker-xsm-summit-090706.pdf. [16] WANG Z, JIANG X. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity [C]//SP 2010: Proceedings of the 2010 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2010: 380-395. |