Sciweavers

86 search results - page 18 / 18
» A general framework for improving query processing performan...
Sort
View
CCS
2009
ACM
14 years 12 days ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...