Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Introduction:
- - Modern Operating Systems
- - Security of Modern Operating Systems
- - Limitations of Kernel Applications for Security Purposes
- - Common Security Problems
- % Background to common security problems %
- - Memory Forensics
- - Malware Analysis
- - Unauthorized Execution
- - Software Theft
- - Our Method
- - Memory Forensics
- - Malware Analysis
- - Unauthorized Execution
- - Software Theft
- - Structure
- Hypervisors:
- - Virtualization
- - Hardware Assisted Virtualization
- - Thin Hypervisor
- - Thin Hypervisor Boot
- - Thin Hypervisor Protection
- - Thin Hypervisor Transparency
- Hypervisors Applications in Security:
- - Memory Forensics:
- - Previous Work
- - Our Method
- - Analysis and Performance
- - Malware Analysis:
- - Previous Work
- - Our Method
- - Analysis and Performance
- - Unauthorized Execution:
- - Previous Work
- - Our Method
- - Analysis and Performance
- - Software Theft:
- - Previous Work
- - Our Method
- - Analysis and Performance
- Conclusions:
- - Contributions
- - Limitations and Future Research
- Summary of Original Articles:
- - Paper 1
- - Paper 2
- - Paper 3
- - Paper 4
- - Paper 5
- - Paper 6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement