Malware Clearance for Secure Commitment of OS-Level Virtual Machines
Abstract
Keywords
Full Text:
PDFReferences
S.T. King and P.M. Chen (2003) “Backtracking Intrusions”, Proc. ACM Symp. Operating Systems Principles (SOSP), pp. 223-236.
D. Price and A. Tucker (2004) “Solaris Zones: Operating System Support for Consolidating Commercial Workloads”, Proc. 18th Large Installation System Administration Conf., pp. 241-254.
Poul-Henning Kamp, Robert N. M. Watson (2000) “Jails: Confining the omnipotent root”, The FreeBSD Project.
R. Paleari, L. Martignoni, E. Passerini, D. Davidson, M. Fredrikson, J. Giffin, and S. Jha (2010) “Automatic Generation of Remediation Procedures for Malware”, Proc. USENIX Conf. Security.
W. Sun, R. Sekar, and V.N. Venkatakrishnan (2005) “One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments”, Proc. 12th ISOC Network and Distributed Systems Symp. (NDSS), pp. 265-278.
S. Soltesz, H. Po¨tzl, M.E. Fiuczynski, A. Bavier, and L. Peterson (2007) “Container-Based Operating System Virtualization: A Scalable, High-Performance Alternative to Hypervisors”, Proc. Second ACM European Conf. Computer Systems.
Y. Yu, F. Guo, S. Nanda, L. Lam, and T. Chiueh (2006) “A Feather-Weight Virtual Machine for Windows Applications”, Proc.Second Int’l Conf. Virtual Execution Environments (VEE), pp. 24-34.
Zhendong Su, Chen, Hsu, Jason Li, Ristenpart, (2005) “Back to the Future: A Framework for Automatic Malware Removal and System Repair”, Proc.University of California, Davis
DOI: http://dx.doi.org/10.36039/AA052014002
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.