Related references
Note: Only part of the references are listed.A lightweight live memory forensic approach based on hardware virtualization
Yingxin Cheng et al.
INFORMATION SCIENCES (2017)
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection
Weizhong Qiang et al.
IEEE ACCESS (2017)
Safe Inspection of Live Virtual Machines
Sahil Suneja et al.
ACM SIGPLAN NOTICES (2017)
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction
Chi-Wei Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
System Call Redirection: A Practical Approach to Meeting Real-world Virtual Machine Introspection Needs
Rui Wu et al.
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2014)
Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection
Adrian L. Shaw et al.
2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E) (2014)
EXTERIOR: Using a Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery
Yangchun Fu et al.
ACM SIGPLAN NOTICES (2013)
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Josiah Dykstra et al.
DIGITAL INVESTIGATION (2012)
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
Brendan Dolan-Gavitt et al.
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)