Taming Virtualization.

IEEE Security and Privacy(2008)

引用 19|浏览21
暂无评分
摘要
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others
更多
查看译文
关键词
Voice mail,Virtual machine monitors,Hardware,Virtual machining,Computer industry,Electrical equipment industry,Resource virtualization,Operating systems,Mediation,Computer applications
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要