


default search action
1st VMSec@CCS 2008: Alexandria, VA, USA
- Jason Nieh, Angelos Stavrou:
Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-298-6
Portability & recovery
- Ionut Constandache, Aydan R. Yumerefendi, Jeffrey S. Chase:
Secure control of portable images in a virtual computing utility. 1-8 - Heidar Pirzadeh, Danny Dubé:
VEP: a virtual machine for extended proof-carrying code. 9-18 - Yih Huang, Angelos Stavrou
, Anup K. Ghosh, Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization. 19-28 - Xiaoqi Jia, Shengzhi Zhang
, Jiwu Jing, Peng Liu:
Using virtual machines to do cross-layer damage assessment. 29-38
Hardware & monitoring
- Grzegorz Milos, Derek Gordon Murray:
Boxing clever with IOMMUs. 39-44 - Mikhail J. Atallah, Eric Bryant, John T. Korb
, John R. Rice:
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. 45-48 - Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. 49-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.