Hiding Virtualization from Attackers and Malware.
Virtual machine environments (VMEs) let a user or administrator run one or more guest operating systems on top of a host operating system. With security researchers relying on VMEs in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virt...
প্রকাশিত: | IEEE Security and privacy : building confidence in a networked world 5, 3 (2007). |
---|---|
প্রধান লেখক: | |
বিন্যাস: | প্রবন্ধ |
ভাষা: | English |