1 |
Samsung KNOX. http://www.phonearena.com/news/Samsung-Knox-found-to-have-a-serious-vulnerability_id50670
|
2 |
Vulnerability report: Xen 3.x. http://secunia.com/advisories/product/15863.
|
3 |
Xen : Security vulnerabilities. http://www.cvedetails.com vulnerability-list/vendor_id-6276/XEN.html. Last accessed April 4, 2012.
|
4 |
Vulnerability report: Xen3.x. http://secunia.com/advisories/product/15 86 3. Last accessed April 4, 2012.
|
5 |
Survey of Security Threats and Countermeasures on Android Environment. Joonhyouk Jang 2013.12
|
6 |
RAISE. Enye lkm rookit modified for ubuntu 8.04. http://packetstormsecurity.com/files/75184/Enye-LKM-Rookit-Modified-For-Ubuntu-8.04.html. Last accessed Sep 4, 2012.
|
7 |
Integrity Protection Solutions for Embedded Systems, FOSDEM 2014 Brussels, Belgium, February , 2014
|
8 |
Sangorrin, Daniel, Shinya Honda, Hiroaki Takada. "Dual operating system architecture for real-time embedded systems." In Proceedings of the 6th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT), Brussels, Belgium, pp. 6-15. 2010.
|
9 |
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 38-49, New York, NY, USA, 2010. ACM.
|
10 |
DINABURG, A., ROYAL, P., SHARIF, M., AND LEE, W. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security (New York, NY, USA, 2008), CCS '08, ACM, pp. 51-62.
|
11 |
D. Clarke, G. E. Suh, B. Gassend, M. van Dijk, and S. Devadas. Checking the integrity of a memory in a snooping-based symmetric multiprocessor (smp) system. Technical report, MIT LCS memo-470, http://csg.csail.mit.edu/pubs/memos/Memo-470/smpMemoryMemo.pdf, 2004.
|