Computer Science ›› 2008, Vol. 35 ›› Issue (1): 97-99.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Intrusion tolerant and fault-tolerant systems require the ability to execute unknown programs in a realistic environment without leaving permanent damages. Virtual machine technique provides an execution environment that is both realistic and isolated, al

Key words: Malware, Secure execution, Virtual machine, Namespace virtualization

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!