Computer Science ›› 2008, Vol. 35 ›› Issue (1): 97-99.
Previous Articles Next Articles
Online:
Published:
Abstract: Intrusion tolerant and fault-tolerant systems require the ability to execute unknown programs in a realistic environment without leaving permanent damages. Virtual machine technique provides an execution environment that is both realistic and isolated, al
Key words: Malware, Secure execution, Virtual machine, Namespace virtualization
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I1/97
Cited