共 16 条
[1]
BITS: a smartcard protected operating system[J] . Paul C. Clark,Lance J. Hoffman.  Communications of the ACM . 1994 (11)
[2]
A Secure and Reliable Bootstrap Architecture. Arbaugh W A,Farber D J,Smith J M. Proceedings of IEEE Computer Society Conference on Security and Privacy . 1997
[3]
N-force daemon prototypetechnical description. Heine D,Kouskoulas Y. Technical Report VS-03-021.The Johns Hopkins University Applied Physics Labo-ratory . 2003
[4]
Hardware Virtualization-Based Rootkits. Zovi D A D. Black Hat USA2006 . 2006
[5]
An archi-tecture for specification-based detection of semantic integrity violations in ker-nel dynamic data. Jr. Petroni L. Nick,Fraser Timothy,Jesus Molina,William A. Arbaugh. Proceedings of the 15th conference on USENIX Security Symposium . 2006
[6]
SecureSwitch:BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. Sun Kun,Wang Jiang,Zhang Fengwei,et al. Network and Distributed System Security Symposium (NDSS) . 2012
[7]
HyperSentry:Enabling stealthy in-context measurement of hypervisor intergrity. Azab A M,Ning Peng,Wang Zhi,et al. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010) . 2010
[8]
Beyond BIOS:Implementing UEFI—The unified extensible firmware interface. Zimmer V,Rothman M,Hale R. . 2006
[9]
HIMA:A hypervisor-based integrity measurement agent. Azab AM,Ning P,Sezer EC,Zhang X. Proc of the2009Annual Computer Security Applications Conf . 2009
[10]
Hypervisor support foridentifying covertly executing binaries. Litty L,Lagar-Cavilla H A,Lie D. Proceedings ofthe 17th USENIX Security Symposium . 2008