Advertisement
Guest User

Untitled

a guest
May 21st, 2019
84
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.16 KB | None | 0 0
  1. Introduction:
  2. - Modern Operating Systems
  3. - Security of Modern Operating Systems
  4. - Limitations of Kernel Applications for Security Purposes
  5. - Common Security Problems
  6. % Background to common security problems %
  7. - Memory Forensics
  8. - Malware Analysis
  9. - Unauthorized Execution
  10. - Software Theft
  11. - Our Method
  12. - Memory Forensics
  13. - Malware Analysis
  14. - Unauthorized Execution
  15. - Software Theft
  16. - Structure
  17.  
  18. Hypervisors:
  19. - Virtualization
  20. - Hardware Assisted Virtualization
  21. - Thin Hypervisor
  22. - Thin Hypervisor Boot
  23. - Thin Hypervisor Protection
  24. - Thin Hypervisor Transparency
  25.  
  26. Hypervisors Applications in Security:
  27. - Memory Forensics:
  28. - Previous Work
  29. - Our Method
  30. - Analysis and Performance
  31. - Malware Analysis:
  32. - Previous Work
  33. - Our Method
  34. - Analysis and Performance
  35. - Unauthorized Execution:
  36. - Previous Work
  37. - Our Method
  38. - Analysis and Performance
  39. - Software Theft:
  40. - Previous Work
  41. - Our Method
  42. - Analysis and Performance
  43. Conclusions:
  44. - Contributions
  45. - Limitations and Future Research
  46.  
  47. Summary of Original Articles:
  48. - Paper 1
  49. - Paper 2
  50. - Paper 3
  51. - Paper 4
  52. - Paper 5
  53. - Paper 6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement