Christodorescu, M., Sailer, R., Schales, D. L., Sgan-
durra, D., and Zamboni, D. (2009). Cloud se-
curity is not (just) virtualization security: a short
paper. In Proceedings of the 2009 ACM Work-
shop on Cloud Computing Security, CCSW ’09,
pages 97–102, New York, NY, USA. ACM. http://
doi.acm.org/10.1145/1655008.1655022.
Constandache, I., Yumerefendi, A., and Chase, J. (2008).
Secure control of portable images in a virtual
computing utility. In Proceedings of the 1st
ACM workshop on Virtual machine security, VM-
Sec ’08, pages 1–8, New York, NY, USA. ACM.
http://doi.acm.org/10.1145/1456482.1456484.
Descher, M., Masser, P., Feilhauer, T., Tjoa,
A. M., and Huemer, D. (2009). Retain-
ing data control to the client in infrastructure
clouds. Availability, Reliability and Security,
International Conference on, 0:9–16. http://
doi.ieeecomputersociety.org/10.1109/ARES.2009.78.
Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A.,
and Chen, P. M. (2002). Revirt: Enabling in-
trusion analysis through virtual-machine logging
and replay. In Culler, D. E. and Druschel,
P., editors, OSDI. USENIX Association. http://
www.usenix.org/events/osdi02/tech/dunlap.html.
Garfinkel, T. and Rosenblum, M. (2003). A virtual ma-
chine introspection based architecture for intrusion
detection. In In Proc. Network and Distributed Sys-
tems Security Symposium, pages 191–206. http://
suif.stanford.edu/papers/vmi-ndss03.pdf.
Lattner, C. and Adve, V. (2004). LLVM: A Com-
pilation Framework for Lifelong Program Analysis
& Transformation. In Proceedings of the Interna-
tional Symposium on Code Generation and Optimiza-
tion: Feedback-directed and Runtime Optimization,
CGO ’04, pages 75–, Washington, DC, USA. IEEE
Computer Society. http://llvm.org/pubs/2003-09-30-
LifelongOptimizationTR.pdf.
Litty, L. and Lie, D. (2006). Manitou: a layer-
below approach to fighting malware. In Torrel-
las, J., editor, ASID, pages 6–11. ACM. http://
doi.acm.org/10.1145/1181309.1181311.
Mihocka, D. and Shwartsman, S. (2008). Virtual-
ization without direct execution or jitting - de-
signing a portable vm. In 1st Workshop on
Architectural and Microarchitectural Support for
Binary Translation. http://bochs.sourceforge.net/
Virtualization
Without Hardware Final.pdf.
Nasab, M. R. (2012). Security functions for vir-
tual machines via introspection. Master’s thesis,
Chalmers University, Sweden. http://publications.lib.
chalmers.se/records/fulltext/160810.pdf.
Payne, B. D., Carbone, M., and Lee, W. (2007). Secure and
Flexible Monitoring of Virtual Machines. Computer
Security Applications Conference, Annual, 0:385–
397. http://doi.ieeecomputersociety.org/10.1109/
ACSAC.2007.10.
Reddi, V. J., Settle, A., Connors, D. A., and Cohn, R. S.
(2004). PIN: A Binary Instrumentation Tool for
Computer Architecture Research and Education. In
Proceedings of the 2004 workshop on Computer Ar-
chitecture Education: held in conjunction with the
31st International Symposium on Computer Archi-
tecture, WCAE ’04, New York, NY, USA. ACM.
http://doi.acm.org/10.1145/1275571.1275600.
Riley, R., Jiang, X., and Xu, D. (2008). Guest-transparent
prevention of kernel rootkits with vmm-based mem-
ory shadowing. In Lippmann, R., Kirda, E., and Tra-
chtenberg, A., editors, RAID, volume 5230 of Lecture
Notes in Computer Science, pages 1–20. Springer.
Rodero-Merino, L., Vaquero, L. M., Caron, E., Mure-
san, A., and Desprez, F. (2012). Building safe paas
clouds: A survey on security in multitenant software
platforms. Computers & Security, 31(1):96 – 108.
http://dx.doi.org/10.1016/j.cose.2011.10.006.
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). Secvi-
sor: a tiny hypervisor to provide lifetime kernel code
integrity for commodity oses. In Bressoud, T. C.
and Kaashoek, M. F., editors, SOSP, pages 335–350.
ACM. http://doi.acm.org/10.1145/1294261.1294294.
Vaquero, L. M., Rodero-Merino, L., and Mor´an, D. (2011).
Locking the sky: a survey on IaaS cloud security.
Computing, 91:93–118. http://dx.doi.org/10.1007/
s00607-010-0140-x.
Wan, M., Moore, R., and Rajasekar, A. (2009). In-
tegration of cloud storage with data grids. Com-
puting, (October). https://www.irods.org/pubs/
DICE
icvci3 mainpaper pub-0910.pdf.
HypervisorIntegrityMeasurementAssistant
35