期刊文献+

VMware虚拟机检测技术研究 被引量:3

下载PDF
导出
摘要 在当信息安全领域,特别是在恶意软件分析等方面,经常利用虚拟机技术,以提高病毒分析过程中的安全性和节约硬件资源。该文通过对基于特权级压缩的VMware虚拟机的分析,提出了虚拟机检测的基本原理和方法,并提出了未来虚拟机检测技术的发展方向。
出处 《电脑知识与技术(过刊)》 2011年第4X期2700-2702,2711,共4页 Computer Knowledge and Technology
  • 相关文献

参考文献7

  • 1薛海峰,卿斯汉,张焕国.XEN虚拟机分析[J].系统仿真学报,2007,19(23):5556-5558. 被引量:20
  • 2Sun Bing.Rambling on the Virtualization Technology Security[].China Software Security.2008
  • 3Keith Adams,Ole Agesen.A Comparison of Software and Hardware Techniques for x86Virtualization[K].VMwarecom.
  • 4Peter Ferrie.Attacks on More Virtual Machine Emulators[].SYMANTEC ADVANCED THREAT RESEARCH.2007
  • 5Dino A,Dai Zovi.Hardware Virtualization Rookits[]..2006
  • 6J.E.Smith.Virtual Machines: Architectures,Implementations and Applications HOTCHIPS 17,Tutorial 1,Part 2[]..2005
  • 7Hagen Fritsch.Analysis and detection of virtualization-based rootkits[]..2008

二级参考文献12

  • 1Paul Barham, Boris Dragovic, Keir Fraser, et al. XEN and the Art of Virtualization [C]// ACM Symposium on Operating Systems Principles (SOSP'03. ACM), ISBN: 1-58113-757-5. New York, USA: ACM Press, 2003,164-177.
  • 2Ian Pratt, Keir Fraser, Steven Hand, et al. XEN 3.0 and the Art of Virtualization [EB/OL]. (2005) [2007]. http://www, linuxsymposium.org/2005/linuxsymposium_procv2.pdf.
  • 3Susanta Nanda, Tzi-cker Chiueh. A Survey on Virtualization Technologies [EB/OL]. (2005) [2007]. http://www. ecsl. cs. sunysb.edu/tr/TR 179.pdf.
  • 4P.M.Chen, B.D. Noble. When Virtual Is Better Than Real [C]// Proceedings of Workshop on Hot Topics in Operating Systems, 2001(///). Elmau, Germany. USA: IEEE Computer Society Press, 2001,133-138.
  • 5Nadir Kiyanclar. A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing [EB/OL] (2005) [2007]. http://citeseer.ist.psu.edu/kiyanclar05survey.html.
  • 6J. S. Robin, C. E. Irvine. Analysis of the Intel Pentiums Ability to Support a Secure Virtual Machine Monitor [EB/OL] (2000) [2006]. http://citeseer.ist.psu.edu/robin00analysis.html.
  • 7Intel Corporation. Intel Virtualization Specification for the IA-32 Intel Architecture [EB/OL]. (2005) [2006]. http://cache-www.intel.com/cd/00/00/19/76/197666_197666.pdf.
  • 8AMD Corporation. AMD64 Virtualization Codenamed ‘Pacifica' Technology Secure Virtual Machine Architecture Reference Manual [EB/OL]. (2005) [2006]. http: // www.amd.com /us-en /assets /content_type/white_papers and tech docs/33047.pdf.
  • 9Keir Fraser, Steven Hand, Rolf Neugebauer, et al. Safe Hardware Access with the Xen Virtual Machine Monitor [EB/OL]. (2004) [2006]. http: //www. cl.cam.ac.uk/ Research/ SRG/ netos/ papers/ 2004-oasis-ngio,pdf.
  • 10Kenneth J. Duda, David R. Cheriton. Borrowed-Virtual-Time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler [C]// Proceedings of the 17th ACM SIGOPS. Symposium on Operating Systems Principles, volume 33(5) of ACM Operating Systems Review. New York, USA: ACM Press, 1999,261-276.

共引文献19

同被引文献15

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部