Author of the publication

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers.

, , , , , , , , , , and . OTM Conferences, volume 9415 of Lecture Notes in Computer Science, page 594-611. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection., , , , and . ACSAC, page 407-417. ACM, (2018)CloudIDEA: A Malware Defense Architecture for Cloud Data Centers., , , , , , , , , and 1 other author(s). OTM Conferences, volume 9415 of Lecture Notes in Computer Science, page 594-611. Springer, (2015)Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions., , , and . DEXA Workshops, page 308-312. IEEE Computer Society, (2014)Virtual Machine Introspection in a Hybrid Honeypot Architecture., , , , and . CSET, USENIX Association, (2012)Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 164-177. Springer, (2013)SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing., , , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 231-249. Springer, (2016)Who watches the watcher? Detecting hypervisor introspection from unprivileged guests., , , , and . Digital Investigation, (2018)Adaptive Semantics-Aware Malware Classification., , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 419-439. Springer, (2016)Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system., , , , , and . ACSAC, page 386-395. ACM, (2014)