Filter the results Item type Select All/None Collection Page Event File Folder Image News Item Article Conference Course inBook Incollection Inproceedings person Phdthesis Proceedings Studentthesis Techreport New items since Yesterday Last week Last month Ever Search results Subscribe to an always-updated RSS feed. 4 items matching your search terms. Sort by relevance date (newest first) alphabetically Hypervisor Development Dedicated for Virtual Machine Introspection Located in Student Work Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection ARM has become the leading processor architecture for mobile and IoT devices, while it has recently started claiming a bigger slice of the server market pie as ... Located in Publications Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots The development and research of tools for forensically analyzing Linux memory snapshots have stalled in recent years as they cannot deal with the high degree ... Located in Publications Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection The growing complexity of modern malware drives security applications to leverage Virtual Machine Introspection (VMI), which provides a complete and untainted ... Located in Publications