4.7 Article

Blue-Pill Oxpecker: A VMI Platform for Transactional Modification

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A lightweight live memory forensic approach based on hardware virtualization

Yingxin Cheng et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection

Weizhong Qiang et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Software Engineering

Safe Inspection of Live Virtual Machines

Sahil Suneja et al.

ACM SIGPLAN NOTICES (2017)

Article Computer Science, Hardware & Architecture

ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction

Chi-Wei Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Proceedings Paper Computer Science, Hardware & Architecture

System Call Redirection: A Practical Approach to Meeting Real-world Virtual Machine Introspection Needs

Rui Wu et al.

2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2014)

Proceedings Paper Computer Science, Information Systems

Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection

Adrian L. Shaw et al.

2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E) (2014)

Article Computer Science, Software Engineering

EXTERIOR: Using a Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery

Yangchun Fu et al.

ACM SIGPLAN NOTICES (2013)

Proceedings Paper Computer Science, Theory & Methods

Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

Yangchun Fu et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Proceedings Paper Computer Science, Information Systems

Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection

Brendan Dolan-Gavitt et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)