3J Tucek,J Newsome, S Lu,C Huang, S Xanthos, D rumley,D Song. Sweeper: A lightweight end-to-end system for defending against fast worms[ A]. Proc of EuroSys[ C]. Lisbon, Portugal: ACM Press,2007. 115 - 128.
4Jon Oberheide, Evan Cooke, Farnam Jahanian. CloudAV: N- Version Antivirus in the Network Cloud[ EB/OL]. http://jon. oberheide, org/ffles/usenix08-cloudav, pdf, 2008.
5Maik Morgenstem, Andreas Marx. System cleaning: Getting rid of malware from infected PCs[ A]. Proc. of the 17th Virus Bul letin International Conference[ C]. Ontario, Canada, 2008.
6S Golovanov,A Gostev, A Monastyrsky. Bootkit: the challenge of 2008[ R/OL]. 18, Dec, 2008, Technique Report of Kav Lab. http://www, viruslist, com/en/analysis, 2008.
7Rutkowska J. Red Pill…or how to detect VMM using (almost) one CPU instruction [ EB/OL ]. http://invisiblethings, org/pa pers/redpill, html, 2004.
8Boris Lau, Vanja Svajcer. Measuring virtual machine detection in malware using DSD tracer[ J]. Journal in Computer Cirolo gy,2008,6(3) : 181 - 195.
9G Qu, S Hariri, S Jangiti, J Rudraraju, S Oh, S Fayssal, G Zhang, M Parashar. Online monitoring and analysis for self protection against network attacks[ A ]. Proc of Intl Conf on Autonomic Computing[ C ]. New York, NY, USA: IEEE CS press, 2004. 324 - 325.
10K E Grosspietsch, K E Silayeva. A combined safety/security approach for co-operative distributed systems[ A ]. Proc of the 18th international parallel and distributed processing symposium [ C]. Sante Fe,NM: IEEE CS press,2004.