6J.E.Smith.Virtual Machines: Architectures,Implementations and Applications HOTCHIPS 17,Tutorial 1,Part 2[]..2005
7Hagen Fritsch.Analysis and detection of virtualization-based rootkits[]..2008
二级参考文献12
1Paul Barham, Boris Dragovic, Keir Fraser, et al. XEN and the Art of Virtualization [C]// ACM Symposium on Operating Systems Principles (SOSP'03. ACM), ISBN: 1-58113-757-5. New York, USA: ACM Press, 2003,164-177.
2Ian Pratt, Keir Fraser, Steven Hand, et al. XEN 3.0 and the Art of Virtualization [EB/OL]. (2005) [2007]. http://www, linuxsymposium.org/2005/linuxsymposium_procv2.pdf.
3Susanta Nanda, Tzi-cker Chiueh. A Survey on Virtualization Technologies [EB/OL]. (2005) [2007]. http://www. ecsl. cs. sunysb.edu/tr/TR 179.pdf.
4P.M.Chen, B.D. Noble. When Virtual Is Better Than Real [C]// Proceedings of Workshop on Hot Topics in Operating Systems, 2001(///). Elmau, Germany. USA: IEEE Computer Society Press, 2001,133-138.
5Nadir Kiyanclar. A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing [EB/OL] (2005) [2007]. http://citeseer.ist.psu.edu/kiyanclar05survey.html.
6J. S. Robin, C. E. Irvine. Analysis of the Intel Pentiums Ability to Support a Secure Virtual Machine Monitor [EB/OL] (2000) [2006]. http://citeseer.ist.psu.edu/robin00analysis.html.
7Intel Corporation. Intel Virtualization Specification for the IA-32 Intel Architecture [EB/OL]. (2005) [2006]. http://cache-www.intel.com/cd/00/00/19/76/197666_197666.pdf.
9Keir Fraser, Steven Hand, Rolf Neugebauer, et al. Safe Hardware Access with the Xen Virtual Machine Monitor [EB/OL]. (2004) [2006]. http: //www. cl.cam.ac.uk/ Research/ SRG/ netos/ papers/ 2004-oasis-ngio,pdf.
10Kenneth J. Duda, David R. Cheriton. Borrowed-Virtual-Time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler [C]// Proceedings of the 17th ACM SIGOPS. Symposium on Operating Systems Principles, volume 33(5) of ACM Operating Systems Review. New York, USA: ACM Press, 1999,261-276.