Login / Signup
SubVirt: Implementing malware with virtual machines.
Samuel T. King
Peter M. Chen
Yi-Min Wang
Chad Verbowski
Helen J. Wang
Jacob R. Lorch
Published in:
IEEE Symposium on Security and Privacy (2006)
Keyphrases
</>
virtual machine
operating system
computing resources
data center
distributed computing
reverse engineering
malware detection
cloud computing environment
low latency
multi tasking
byte code
windows xp
java card
malicious code
databases
resource management
network traffic
data streams