[PDF][PDF] 基于VMM 的操作系统隐藏对象关联检测技术

李博, 沃天宇, 胡春明, 李建欣, 王颖, 怀进鹏 - 软件学报, 2013 - jos.org.cn
… ) is proposed, and the corresponding detection system, vDetector, is designed and implemented…
/security/vmsafe.html [18] Wang Y, Hu CM, Li B. A VMM-based platform to detect hidden …

[HTML][HTML] 基于虚拟机回放的恶意行为检测技术

尹正光, 余荣威, 王丽娜, 刘维杰, 宋衍, 谈诚 - 武汉大学学报(理学版), 2016 - xml-data.org
… A VMM-based intrusion prevention system in cloud computing environment[J]. The
Journal of Supercomputing , 2013, 66 (3) : 1133–1151 DOI:10.1007/s11227-011-0608-2 …

[PDF][PDF] 基于虚拟化的安全监控

项国富, 金海, 邹德清, 陈学广 - 软件学报, 2012 - jos.org.cn
… in detail, such as intrusion detection, honeypot, file integrity … 2.1 入侵检测 入侵检测系统(intrusion
detection system,简称IDS)[… IDS architecture using VMM-based non-intrusive approach. …

[HTML][HTML] 云环境下基于信任的入侵防御研究

汪双兔, 韩坚华, 罗军 - 广东工业大学学报, 2014 - xml-data.org
… The model began with the principle of intrusion prevention with access to behavioral …
Intrusion Prevention System, NIPS),基于主机的入侵防御系统(Host Intrusion Prevention System

[PDF][PDF] 创建软件定义网络中的进程级纵深防御体系结构

崔竞松, 郭迟, 陈龙, 张雅娜 - 软件学报, 2014 - jos.org.cn
… 或基于主机的入侵检测系统(hostbased intrusion detection system,简称HIDS)来保护其免受…
于网络的入侵检测系统(network-based intrusion detection system,简称NIDS)和网络防火墙.这类…

[PDF][PDF] 基于邻接点的VMM 动态完整性度量方法

吴涛, 杨秋松, 贺也平 - 通信学报, 2015 - infocomm-journal.com
基于邻接点的VMM 动态完整性度量方法Method of dynamic integrity measurement for VMM
based on … Method of dynamic integrity measurement for VMM based on adjacency data …

[PDF][PDF] 基于VMCS 结构体的虚拟机恶意对象关联检测方法

王文娟, 杨忠腾, 李昊阳 - 信息工程大学学报, 2021 - xxgcxb.cnjournals.com
… of the security detection method … : a VMMbased platform to detect hidden process by
multi⁃view compari⁃ son[C]/ /13th IEEE International Symposium on High⁃ Assurance Systems

[PDF][PDF] 虚拟机自省技术研究与应用进展

李保珲, 徐克付, 张鹏, 郭莉, 胡玥, 方滨兴 - 软件学报, 2016 - jos.org.cn
… community, and plays an important role in intrusion detection, kernel integrity protection and
many other areas. … Using VMM-based sensors to monitor honeypots. In: Boehm H, ed. Proc. …

[PDF][PDF] 内核完整性保护模型的设计与实现

田东海, 陈君华, 贾晓启, 胡昌振 - 通信学报, 2015 - infocomm-journal.com
… Towards a VMM-based usage control framework for OS kernel integrity protection[A].
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C]. Sophia …

[PDF][PDF] 虚拟机自省中一种消除语义鸿沟的方法

崔超远, 乌云, 李平, 张晓明 - 通信学报, 2015 - infocomm-journal.com
… used in areas such as intrusion detection and malware analysis. … detection through VMM-based
“out-of-the-box” semantic view reconstruction[A]. Computer and Communication Security