Abstract is missing.
- Secure control of portable images in a virtual computing utilityIonut Constandache, Aydan R. Yumerefendi, Jeffrey S. Chase. 1-8 [doi]
- VEP: a virtual machine for extended proof-carrying codeHeidar Pirzadeh, Danny Dubé. 9-18 [doi]
- Efficiently tracking application interactions using lightweight virtualizationYih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia. 19-28 [doi]
- Using virtual machines to do cross-layer damage assessmentXiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu. 29-38 [doi]
- Boxing clever with IOMMUsGrzegorz Milos, Derek Gordon Murray. 39-44 [doi]
- Binding software to specific native hardware in a VM environment: the puf challenge and opportunityMikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice. 45-48 [doi]
- Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based securitySergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith. 49-58 [doi]