A comparison of software and hardware techniques for x86 virtualization, Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pp.2-13, 2006. ,
Making byzantine fault tolerant systems tolerate byzantine faults, Proceedings of the 6th USENIX Symposium of Network Systems Design and Impementation (NSDI '09), 2009. ,
Reiner Sailer, and Leendert van Doorn. vtpm: virtualizing the trusted platform module, USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, 2006. ,
Checking for race conditions in file accesses, Computing Systems, vol.9, issue.2, pp.131-152, 1996. ,
A domain and type enforcement unix prototype, Proceedings of the Fifth USENIX UNIX Security Symposium, pp.127-140, 1996. ,
Using iommus for virtualization, Linux Symposium, 2006. ,
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, ASP- LOS XIII: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pp.2-13, 2008. ,
An experimental time-sharing system, Proc. Spring Joint Computer Conference (AFIPS), pp.335-379, 1962. ,
Taming Virtualization, IEEE Security & Privacy Magazine, vol.6, issue.1, pp.65-67, 2008. ,
DOI : 10.1109/MSP.2008.24
Revirt: enabling intrusion analysis through virtual-machine logging and replay, SIGOPS Operating System Review, vol.36, issue.SI, pp.211-224, 2002. ,
SMM rootkits, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-12, 2008. ,
DOI : 10.1145/1460877.1460892
Attacks on virtual machine emulators. Symantec Advanced Threat Research, 2006. ,
Pdp-10 virtual machines, Proceedings ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems, pp.30-34, 1969. ,
A virtual machine introspection based architecture for intrusion detection, Proc. Network and Distributed Systems Security Symposium, pp.191-206, 2003. ,
When virtual is harder than real: Security challenges in virtual machine based computing environments, 10th Workshop on Hot Topics in Operating Systems, 2005. ,
Intel virtualization technology for directed i/o (intel vtd ) Technology@ Intel Magazine, 2007. ,
Are virtual-machine monitors microkernels done right?, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.95-99, 2006. ,
DOI : 10.1145/1113361.1113363
Multi-level security requirements for hypervisors, Computer Security Applications Conference, 21st Annual, p.9, 2005. ,
HyperSpector, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05, pp.197-207, 2005. ,
DOI : 10.1145/1064979.1065006
SubVirt: implementing malware with virtual machines, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.14, 2006. ,
DOI : 10.1109/SP.2006.38
Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp.29-42, 2001. ,
HIPernet: a decentralized security infrastructure for large scale grid environments, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.140-147, 2005. ,
DOI : 10.1109/GRID.2005.1542735
vBlades: Optimized paravirtualization for the Itanium processor family, 2000. ,
Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems on -, pp.210-224, 1973. ,
DOI : 10.1145/800122.803961
The linux bios, ALS'00: Proceedings of the 4th annual Linux Showcase & Conference, pp.21-21, 2000. ,
Improving Xen security through disaggregation, Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments , VEE '08, pp.151-160, 2008. ,
DOI : 10.1145/1346256.1346278
A virtual machine time-sharing system, IBM Systems Journal, vol.9, issue.3, p.199, 1970. ,
DOI : 10.1147/sj.93.0199
Shamon: A system for distributed mandatory access control, ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference, pp.23-32, 2006. ,
A hypervisor ips based on hardware assisted virtualization technology, BlackHat USA, 2008. ,
Control of system calls from outside of virtual machines, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2116-1221, 2008. ,
DOI : 10.1145/1363686.1364196
Formal requirements for virtualizable third generation architectures, Trans. on Computers C, vol.22, pp.644-656, 1973. ,
A real-time integrity monitor for xen virtual machine, ICNS '06: Proceedings of the International conference on Networking and Services, page 90, 2006. ,
Detecting System Emulators, Lecture Notes in Computer Science, vol.4779, pp.1-18, 2007. ,
DOI : 10.1007/978-3-540-75496-1_1
Introducing blue pill, BlackHat USA, 2008. ,
Building a MAC-based security architecture for the Xen open-source hypervisor, Computer Security Applications Conference, 21st Annual, p.10, 2005. ,
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.276-285, 2005. ,
DOI : 10.1109/CSAC.2005.13
sHype: Secure hypervisor approach to trusted virtualized systems, 2005. ,
Intel virtualization technology, Computer, vol.38, issue.5, pp.48-56, 2005. ,
Vm and the vm community: Past, present, and future, SHARE, pp.9059-9061, 1997. ,
Subverting the xen hypervisor, BlackHat USA, 2008. ,
Attacking intel R ï¿¿ trusted execution technology, BlackHat DC, 2009. ,