Author of the publication

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.

, , , , and . WOOT, USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of Hybrid and Hierarchical Simulation to Reduce Computation Costs., and . MASCOTS, page 197-202. The Society for Computer Simulation, (1993)Multiprogramming Performance Degradation: Case Study on a Shared Memory Multiprocesor., and . ICPP (2), page 205-208. Pennsylvania State University Press, (1989)0-271-00686-2.Improving Cache Performance of Network Intensive Workloads., , , and . ICPP, page 87-94. IEEE Computer Society, (2001)A Framework for Classifying Peer-to-Peer Technologies., , and . CCGRID, page 368-375. IEEE Computer Society, (2002)Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics., , , and . SEC, volume 147 of IFIP, page 83-100. Kluwer / Springer, (2004)Experimental Evaluation of Performance and Scalability of a Multiprogrammed Shared-Memory Multiprocessor., , and . SPDP, page 11-18. IEEE Computer Society, (1993)Measurement and simulation based performance analysis of parallel I/O in a high-performance cluster system., and . SPDP, page 332-339. IEEE Computer Society, (1996)Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach., , , , and . SRDS, page 127-136. IEEE Computer Society, (2011)Formalizing System Behavior for Evaluating a System Hang Detector., , and . SRDS, page 269-278. IEEE Computer Society, (2008)A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture., , and . SRDS, page 306-307. IEEE Computer Society, (1999)