Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
Michael C. GraceZhi WangDeepa SrinivasanJinku LiXuxian JiangZhenkai LiangSiarhei LiakhPublished in: SecureComm (2010)
Keyphrases
- virtual machine
- virtual machine monitor
- operating system
- protection scheme
- computer systems
- protection schemes
- data center
- windows xp
- previously mentioned
- distributed computing
- ibm zenterprise
- intrusion detection
- linear combination
- distributed systems
- low cost
- kernel methods
- hardware implementation
- single commodity
- hardware and software
- multiple kernel
- real time
- kernel function
- support vector
- network access
- data processing