Abstract is missing.
- A formal model for virtual machine introspectionJonas Pfoh, Christian A. Schneider, Claudia Eckert 0001. 1-10 [doi]
- Emulating emulation-resistant malwareMin Gyung Kang, Heng Yin, Steve Hanna, Stephen McCamant, Dawn Song. 11-22 [doi]
- TimeCapsule: secure recording of accesses to a protected datastoreSrinivas Krishnan, Fabian Monrose. 23-32 [doi]
- The cake is a lie: privilege rings as a policy resourceSergey Bratus, Peter C. Johnson 0001, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto. 33-38 [doi]
- Application containers without virtual machinesMicah Sherr, Matt Blaze. 39-42 [doi]
- Availability-sensitive intrusion recoveryShengzhi Zhang, Xi Xiong, Xiaoqi Jia, Peng Liu 0005. 43-48 [doi]