参考文献
[1]Rosenblum M,Garfinkel T.Virtual Machine Monitors:Current Technology and Future[J].IEEE Computer,2005,38(5):39-47.
[2]Amazon.Amazon Elastic Compute Cloud(Amazon EC2)[EB/OL].(2009-08-15).http://aws.amazon.com/ec2.
[3]Dinaburg A,Royal P,Sharif M,et al.Ether:Malware Analysis via Hardware Virtualization Extensions[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2008:51-62.
[4]Tian Ming,Zhang Yongsheng.Analysis of Cloud Computing and Its Security[C]//Proceedings of International Symposium on Information Technology in Medicine and Education.Washington D.C.,USA:IEEE Press,2012:99-102.
[5]King S T,Chen P M.SubVirt:Implementing Malware with Virtual Machines[C]//Proceedings of IEEE Sym-posium on Security and Privacy.Washington D.C.,USA:IEEE Press,2006:314-327.
[6]Goldberg R P.Survey of Virtual Machine Research[J].Computer,1974,7(6):34-45.
[7]Holsopple J,Yang S,Argauer B.Virtual Terrain:A Security-based Representation of a Computer Network[C]//Pro-ceedings of Defense and Security Symposium on Inter-national Society for Optical Engineering.Berlin,Germany:Springer,2008.
[8]Kalagiakos P,Bora M.Cloud Security Tactics:Virtuali-zation and the VMM[C]//Proceedings of the 6th International Conference on Application of Information & Communication Technologies.Washington D.C.,USA:IEEE Press,2012.
[9]金戈,薛质,齐开悦.主引导记录型Rootkit建模及其静态检测方法[J].计算机工程,2015,41(7):184-189.
[10]Chen Lin,Liu Bo,Hu Huaping,et al.A Layered Malware Detection Model Using VMM[C]//Proceedings of the 11th International Conference on Trust,Security and Pri-vacy in Computing and Communications.Washington D.C.,USA:IEEE Press,2012.
[11]高勇,范明钰.基于虚拟机技术的进程分析方法[J].计算机应用,2010,35(5):1327-1330.
[12]温研,赵金晶,王怀民.基于本地虚拟化技术的隐藏进程检测[J].计算机应用,2008,28(7):1769-1771.
[13]Li Bo,Li Jianxin,Wo Tianyu,et al.A VMM-based System Call Interposition Framework for Program Monitoring[C]//Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems.Washington D.C.,USA:IEEE Press,2010.
[14]V Probes Programming Reference[EB/OL].(2013-07-10).http://wenku.it168.com/d_001133146.shtml.
[15]乔然,胡俊,荣星.云计算客户虚拟机间的安全机制研究与实现[J].计算机工程,2014,40(12):26-32.
编辑顾逸斐 |