7Salzman, Barian M, Pomerantz O. The Linux Kernel Module Programming Guide[ EB/OL]. 2005. http://www, tldp. org/ guides, html.
8Murillo T. Analysis of the KNARK Rootkit [ EB/OL]. 2004. http://www, ossec, net /rootkits/studies/knark. txt.
9Seshadri A,Luk M, Qu N, et al.SecVisor:A tiny hypervisor to guarantee lifetime kernel code integrity for commodity OSes[C]// Proceedings of the ACM Symposium on Operating Systems Principles,SOSP 2007,October 2007.
10Riley R, Jiang Xuxian,Xu Dongyan.Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing[C]//Pro- ceedings of the llth International Symposium on Recent Ad- vances in Intrusion Detection,September 15-17 2008.