Sign in
VMSec
2008
2008
2008
Keyphrases
Publications
2008
Heidar Pirzadeh
,
Danny Dubé
VEP: a virtual machine for extended proof-carrying code.
VMSec
(2008)
Xiaoqi Jia
,
Shengzhi Zhang
,
Jiwu Jing
,
Peng Liu
Using virtual machines to do cross-layer damage assessment.
VMSec
(2008)
Yih Huang
,
Angelos Stavrou
,
Anup K. Ghosh
,
Sushil Jajodia
Efficiently tracking application interactions using lightweight virtualization.
VMSec
(2008)
Ionut Constandache
,
Aydan R. Yumerefendi
,
Jeffrey S. Chase
Secure control of portable images in a virtual computing utility.
VMSec
(2008)
Grzegorz Milos
,
Derek Gordon Murray
Boxing clever with IOMMUs.
VMSec
(2008)
Mikhail J. Atallah
,
Eric Bryant
,
John T. Korb
,
John R. Rice
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.
VMSec
(2008)
Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008
VMSec
(2008)
Sergey Bratus
,
Michael E. Locasto
,
Ashwin Ramaswamy
,
Sean W. Smith
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
VMSec
(2008)