1. Canavan J. The evolution of malicious IRC bots. White Paper. Cupertino, CA, USA: Symantec, 2005.
2. Mohurle S, Patil M. A brief study of Wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 2017, 8(5): 1938-1940.
3. Shoch J F, Hupp J A. The “Worm” programs early -- Experience with a distributed computation. Communications of the ACM, 1982, 25(3): 172-180.
4. Thomas M A, Dhillon G. Deep structures of information systems security. Proceedings of the 12th Americas Conference on Information Systems (AMCIS’06), 2006, Aug 4-6, Acapulco, México. Atlanta, GA, USA: Association for Information Systems, 2006: 3743-3480.
5. Garfinkel T, Rosenblum M. A virtual machine introspection based architecture for intrusion detection. Proceedings of the 2003 Network and Distributed System Security Symposium (NDSS’03), 2003, Feb 6-7, San Diego, CA, USA. Geneva, Switzerland: Internet Society, 2003.
6. Kavipurapu K M, Frailey D J. Quantification of architectures using software science. ACM SIGARCH Computer Architecture News, 1979, 7(10): 2-6.
7. Payne B D, Carbone M, Lee W. Secure and flexible monitoring of virtual machines. Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07), 2007, Dec 10-14, Miami Beach, FL, USA. Piscataway, NJ, USA: IEEE, 2007: 385-397.
8. Payne B D, Carbone M, Sharif M, et al. Lares: An architecture for secure active monitoring using virtualization. Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP'08), 2008, May 18-22, Oakland, CA, USA. Piscataway, NJ, USA: IEEE, 2008: 233-247.
9. Klemperer P F, Jeon H Y, Payne B D, et al. High-performance memory snapshotting for real-time, consistent, hypervisor-based monitors. IEEE Transactions on Dependable and Secure Computing, 2020, 17(3): 518-535.
10. Dinaburg A, Royal P, Sharif M, et al. Ether: Malware analysis via hardware virtualization extensions. Proceedings of the 15th ACM Conference on Computer and Communications security (CCS’08), 2008, Oct 27-31, Alexandria, VG, USA. New York, NY, USA: ACM, 2008: 51-62.
11. Yan L K, Jayachandra M, Zhang M, et al. V2E: Combining hardware virtualization and software emulation for transparent and extensible malware analysis. Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environment (VEE '12), 2012, Mar 3-4, London, UK. New York, NY, USA: ACM, 2012: 97-108.
12. Clam antivirus user manual. San Jose, CA, USA: Cisco Systems, Inc, 2019.
13. Hay A, Cid D, Bray R. OSSEC host-based intrusion detection guide. Amsterdam, Netherlands: Elsevier, Inc. 2008.
14. Patil R, Dudeja H, Modi C. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. International Journal of Information Security, 2020, 19: 147-162.
15. Sadek I, Chong P, Rehman S U, et al. Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques. Data in Brief, 2019, 26: Article 104437.
16. Dabak P, Phadke S, Borate M. Undocumented Windows NT. New York, NY, USA: Wiley, 1999.
17. Kivity A, Kamay Y, Laor D, et al. KVM: The Linux virtual machine monitor. Proceedings of the 2007 Linux Symposium: Vol 1, 2007, Jun 27-30, Ottawa, Canada. 2007: 225-230.
18. Intel® 64 and IA-32 Architectures software developer’s manual, Volume 3 (3A, 3B, 3C & 3D): System programming guide. Order Number: 325384-070US. Santa Clara, CA, USA. Intel Corporation, 2019.
19. AMD64 Architecture programmer’s manual, Volume 2: System programming. Revision 3.30. Sunnyvale, CA, USA: Advanced Micro Devices, Ins, 2018.
20. Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03), 2003, Oct 19-22, Bolton Landing, NY, USA. New York, NY, USA: ACM, 2003: 164-177.
21. Payne B D. Simplifying virtual machine introspection using LibVMI. SANDIA Report SAND2012-7818. Albuquerque, NM, USA and Livermore, CA, USA: Sandia National Laboratories, 2012.
|