Cited By
View all- Cosseron LRilling LSimonin MQuinson M(2024)Simulating the Network Environment of Sandboxes to Hide Virtual Machine Introspection PausesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652280(1-7)Online publication date: 22-Apr-2024
- Franzen FWilhelmer AGrossklags J(2023)RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its AnalysisProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627197(677-690)Online publication date: 4-Dec-2023
- Dangl TSentanoe SReiser H(2023)Retrofitting AMD x86 Processors with Active Virtual Machine Introspection CapabilitiesArchitecture of Computing Systems10.1007/978-3-031-42785-5_12(168-182)Online publication date: 13-Jun-2023
- Show More Cited By