Search

Your search keyword '"virtual machine introspection"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "virtual machine introspection" Remove constraint Descriptor: "virtual machine introspection" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
26 results on '"virtual machine introspection"'

Search Results

1. Retrofitting AMD x86 Processors with Active Virtual Machine Introspection Capabilities

2. SeqTrace: API Call Tracing Based on Intel PT and VMI for Malware Detection

3. A Quest for Best: A Detailed Comparison Between Drakvuf-VMI-Based and Cuckoo Sandbox-Based Technique for Dynamic Malware Analysis

4. (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring

5. A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing

6. Agent-Based File Extraction Using Virtual Machine Introspection

7. VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection

8. Automatic Mitigation of Kernel Rootkits in Cloud Environments

9. NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment

10. Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

11. Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence

12. ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation

13. Furnace: Self-service Tenant VMI for the Cloud

14. A Cooperative Approach to Virtual Machine Based Fault Injection

15. Automatic Uncovering of Tap Points from Kernel Executions

16. VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment

17. Defeating Kernel Driver Purifier

18. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud

19. Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection

20. A Model of Dynamic Malware Analysis Based on VMI

21. Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

22. Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints

23. X-TIER: Kernel Module Injection

24. Investigating the Implications of Virtualization for Digital Forensics

25. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections

Catalog

Books, media, physical & digital resources