-
-
[分享]Virtual Machine + Security
-
发表于: 2009-11-20 12:46 6443
-
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor-- Security Policy Enfo.pdf (418.4 KB)
Investigating the Implications of Virtual Machine Introspection for Digital Forensics.pdf (136.7 KB)
Is Your Virtual Machine Monitor Secure.pdf (92.9 KB)
Protection and evaluation on virtual machines based on extensible communication and symmetric en.pdf (187.6 KB)
The Application of Virtual Machines on System Security.pdf (338.4 KB)
Trusted virtual machine monitor-based group signature architecture.pdf (291.7 KB)
Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine.pdf (344.9 KB)
Analysis of Virtual Machine Applied to Malware Detection System.pdf (214.5 KB)
Investigating the Implications of Virtual Machine Introspection for Digital Forensics.pdf (136.7 KB)
Is Your Virtual Machine Monitor Secure.pdf (92.9 KB)
Protection and evaluation on virtual machines based on extensible communication and symmetric en.pdf (187.6 KB)
The Application of Virtual Machines on System Security.pdf (338.4 KB)
Trusted virtual machine monitor-based group signature architecture.pdf (291.7 KB)
Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine.pdf (344.9 KB)
Analysis of Virtual Machine Applied to Malware Detection System.pdf (214.5 KB)
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
看原图
赞赏
雪币:
留言: