Author of the publication

Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines.

, , , , and . COMPSAC, page 37-46. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control of system calls from outside of virtual machines., , and . SAC, page 2116-1221. ACM, (2008)Load-based covert channels between Xen virtual machines., and . SAC, page 173-180. ACM, (2010)Identifying Useful Features for Malware Detection in the Ember Dataset., , and . CANDAR Workshops, page 360-366. IEEE, (2019)Trends of anti-analysis operations of malwares observed in API call logs.. J. Comput. Virol. Hacking Tech., 14 (1): 69-85 (2018)Grammar Compression of Call Traces in Dynamic Malware Analysis., and . J. Inf. Process., (2017)A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface., , , , , , , , , and 39 other author(s). ISSCC, page 130-132. IEEE, (2022)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , and 4 other author(s). VEE, page 121-130. ACM, (2009)MobileScope: A Programming Language with Objective Mobility., , , and . ICDCS Workshops, page 542-547. IEEE Computer Society, (2004)SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation., and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 112-132. Springer, (2002)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , and . CODASPY, page 127-134. ACM, (2018)