O. [. Adams and . Agesen, A comparison of software and hardware techniques for x86 virtualization, Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pp.2-13, 2006.

A. [. Wong, M. Clement, M. Marchetti, L. Dahlin, and . Alvisi, Making byzantine fault tolerant systems tolerate byzantine faults, Proceedings of the 6th USENIX Symposium of Network Systems Design and Impementation (NSDI '09), 2009.

S. Berger, R. Cáceres, K. A. Goldman, and R. Perez, Reiner Sailer, and Leendert van Doorn. vtpm: virtualizing the trusted platform module, USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, 2006.

M. Bishop and M. Dilger, Checking for race conditions in file accesses, Computing Systems, vol.9, issue.2, pp.131-152, 1996.

L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, A domain and type enforcement unix prototype, Proceedings of the Fifth USENIX UNIX Security Symposium, pp.127-140, 1996.

M. Ben-yehuda, Using iommus for virtualization, Linux Symposium, 2006.

T. Chen, E. C. Garfinkel, P. Lewis, C. A. Subrahmanyam, D. Waldspurger et al., Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, ASP- LOS XIII: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pp.2-13, 2008.

F. J. Corbató, M. Merwin-daggett, and R. C. Daley, An experimental time-sharing system, Proc. Spring Joint Computer Conference (AFIPS), pp.335-379, 1962.

M. Carbone, D. Zamboni, and W. Lee, Taming Virtualization, IEEE Security & Privacy Magazine, vol.6, issue.1, pp.65-67, 2008.
DOI : 10.1109/MSP.2008.24

W. George, S. T. Dunlap, S. King, M. A. Cinar, P. M. Basrai et al., Revirt: enabling intrusion analysis through virtual-machine logging and replay, SIGOPS Operating System Review, vol.36, issue.SI, pp.211-224, 2002.

[. Embleton, S. Sparks, and C. Zou, SMM rootkits, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-12, 2008.
DOI : 10.1145/1460877.1460892

]. P. Fer06 and . Ferrie, Attacks on virtual machine emulators. Symantec Advanced Threat Research, 2006.

]. S. Gal69 and . Galley, Pdp-10 virtual machines, Proceedings ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems, pp.30-34, 1969.

M. Garfinkel and . Rosenblum, A virtual machine introspection based architecture for intrusion detection, Proc. Network and Distributed Systems Security Symposium, pp.191-206, 2003.

[. Garfinkel and M. Rosenblum, When virtual is harder than real: Security challenges in virtual machine based computing environments, 10th Workshop on Hot Topics in Operating Systems, 2005.

]. R. Hir07 and . Hiremane, Intel virtualization technology for directed i/o (intel vtd ) Technology@ Intel Magazine, 2007.

G. Heiser, V. Uhlig, and J. Levasseur, Are virtual-machine monitors microkernels done right?, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.95-99, 2006.
DOI : 10.1145/1113361.1113363

]. P. Kar05 and . Karger, Multi-level security requirements for hypervisors, Computer Security Applications Conference, 21st Annual, p.9, 2005.

K. Kourai and S. Chiba, HyperSpector, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05, pp.197-207, 2005.
DOI : 10.1145/1064979.1065006

[. King and P. Chen, SubVirt: implementing malware with virtual machines, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.14, 2006.
DOI : 10.1109/SP.2006.38

P. Loscocco and S. Smalley, Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp.29-42, 2001.

J. Laganier, P. Vicat-blanc, and . Primet, HIPernet: a decentralized security infrastructure for large scale grid environments, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.140-147, 2005.
DOI : 10.1109/GRID.2005.1542735

T. [. Magenheimer and . Christian, vBlades: Optimized paravirtualization for the Itanium processor family, 2000.

J. [. Madnick and . Donovan, Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems on -, pp.210-224, 1973.
DOI : 10.1145/800122.803961

R. Minnich, J. Hendricks, and D. Webster, The linux bios, ALS'00: Proceedings of the 4th annual Linux Showcase & Conference, pp.21-21, 2000.

D. G. Murray, G. Milos, and S. Hand, Improving Xen security through disaggregation, Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments , VEE '08, pp.151-160, 2008.
DOI : 10.1145/1346256.1346278

[. Meyer and L. Seawright, A virtual machine time-sharing system, IBM Systems Journal, vol.9, issue.3, p.199, 1970.
DOI : 10.1147/sj.93.0199

M. Mts-+-06-]-mccune-jonathan, J. Trent, B. Stefan, C. Ramon, and S. Reiner, Shamon: A system for distributed mandatory access control, ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference, pp.23-32, 2006.

J. Murakami, A hypervisor ips based on hardware assisted virtualization technology, BlackHat USA, 2008.

K. Onoue, Y. Oyama, and A. Yonezawa, Control of system calls from outside of virtual machines, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2116-1221, 2008.
DOI : 10.1145/1363686.1364196

R. [. Popek and . Goldberg, Formal requirements for virtualizable third generation architectures, Trans. on Computers C, vol.22, pp.644-656, 1973.

[. , A. Quynh, and Y. Takefuji, A real-time integrity monitor for xen virtual machine, ICNS '06: Proceedings of the International conference on Networking and Services, page 90, 2006.

T. Raffetseder, C. Krügel, and E. Kirda, Detecting System Emulators, Lecture Notes in Computer Science, vol.4779, pp.1-18, 2007.
DOI : 10.1007/978-3-540-75496-1_1

]. J. [-rut08 and . Rutkowska, Introducing blue pill, BlackHat USA, 2008.

. Sjv-+-05a-]-r, T. Sailer, E. Jaeger, R. Valdez, R. Caceres et al., Building a MAC-based security architecture for the Xen open-source hypervisor, Computer Security Applications Conference, 21st Annual, p.10, 2005.

T. Sailer, E. Jaeger, R. Valdez, R. Caceres, S. Perez et al., Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.276-285, 2005.
DOI : 10.1109/CSAC.2005.13

. Svj-+-05-]-r, E. Sailer, T. Valdez, R. Jaeger, L. Perez et al., sHype: Secure hypervisor approach to trusted virtualized systems, 2005.

]. R. Unr-+-05, G. Uhlig, D. Neiger, A. Rodgers, . Santoni et al., Intel virtualization technology, Computer, vol.38, issue.5, pp.48-56, 2005.

]. M. Var97 and . Varian, Vm and the vm community: Past, present, and future, SHARE, pp.9059-9061, 1997.

]. R. Woj08 and . Wojtczuk, Subverting the xen hypervisor, BlackHat USA, 2008.

J. [. Wojtczuk and . Rutkowska, Attacking intel R ï¿¿ trusted execution technology, BlackHat DC, 2009.