Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection

S. Proskurin*, T. Lengyel, M. Momeu, C. Eckert, A. Zarras

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingAcademicpeer-review

7 Citations (Web of Science)
Original languageEnglish
Title of host publication34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)
PublisherThe Association for Computing Machinery
Pages407-417
Number of pages11
ISBN (Print)9781450365697
DOIs
Publication statusPublished - 2018
Event34th Annual Computer Security Applications Conference (ACSAC) - PR
Duration: 3 Dec 20187 Dec 2018

Conference

Conference34th Annual Computer Security Applications Conference (ACSAC)
Period3/12/187/12/18

Cite this