VMM-based hidden process detection and identification using Lycosid
- 5 March 2008
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- GeigerPublished by Association for Computing Machinery (ACM) ,2006
- Detecting past and present intrusions through vulnerability-specific predicatesPublished by Association for Computing Machinery (ACM) ,2005
- Detecting Stealth Software with Strider GhostBusterPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Hidden processes: the implication for intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Progress-based regulation of low-importance processesPublished by Association for Computing Machinery (ACM) ,1999
- Exploiting process lifetime distributions for dynamic load balancingACM Transactions on Computer Systems, 1997
- A retrospective on the VAX VMM security kernelIEEE Transactions on Software Engineering, 1991