1Artem Dinaburg , Paul R, oyal, Monirul Sharif , Wenke Lee. Ether : Malware Analysis via Hardware Virtualization Extensions n Proceedings of the communications security 15th ACM conference on Computer and 2008.
2P. Ferrie. Attacks on virtual machine emulators, Jan 2007.
3K. Fraser. x86: Update xen--detect utility to scan for Xen signature in CPU1D space, Dec 2008. xen-unstable mailing list.
4V. Basili and B. T, Perricone. Software errors and complexity: an empirical investigation, 1993.
8Advanced Micro Devices. AMD--V? Nested Paging. July 2008.
9S .T .Jones Arpaci--Dusseau Environment [M]. (USENIX' 06), ,A .C .Arp&ci-Dusse&u, and R .H . Antfarm: Tracking Processs in a Virtual Machine In Proceedings of the USENIX Annual TechnicaJ Conference Boston, Massachusetts, June 2006.
10Anh M. Nguyen, N&bil Schear, HeeDong Jung. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.2009.