An analysis of hardware-assisted virtual machine based rootkits
Approved for public release; distribution is unlimited === The use of virtual machine (VM) technology has expanded rapidly since AMD and Intel implemented hardware-assisted virtualization in their respective x86 architectures. These new capabilities have resulted in a corresponding expansion of secu...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2014
|
Online Access: | http://hdl.handle.net/10945/42621 |