[1]朱佳, 祁娟. 以虚拟化技术为基础的云计算平台设计探析[J]. 中国新通信, 2024, 26(4): 6466[2]王国峰, 刘川意, 潘鹤中, 等. 云计算模式内部威胁综述[J]. 计算机学报, 2017, 40(2): 296316[3]Cojocar L, Kim J, Patel M, et al. Are we susceptible to rowhammer? An endtoend methodology for cloud providers[C] Proc of the IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2020: 712728[4]Zhou M, Ruan S, Liu J, et al. vTPMSM: An application scheme of SM2SM3SM4 algorithms based on trusted computing in cloud environment[C] Proc of the 15th IEEE Int Conf on Cloud Computing (CLOUD). Piscataway, NJ: IEEE,2022: 351356[5]王晓, 赵军, 张建标. 基于可信软件基的虚拟机动态监控机制研究[J]. 信息网络安全, 2020, 20(2): 713[6]刘川意, 王国峰, 林杰, 等. 可信的云计算运行环境构建和审计[J]. 计算机学报, 2016, 39(2): 339350[7]涂碧波, 程杰, 夏豪骏, 等. 云虚拟化平台可信证明技术研究综述[J]. 通信学报, 2021, 42(12): 212225[8]Hosseinzadeh S, Laurén S, Leppnen V. Security in containerbased virtualization through vTPM[C] Proc of the 9th Int Conf on Utility and Cloud Computing. New York: ACM, 2016: 214219[9]段翼真, 刘忠, 施展. 一种支持多域访问的可信云终端设计[J]. 华中科技大学学报: 自然科学版, 2017, 45(12): 3238[10]England P, Loeser J. Paravirtualized TPM sharing[C] Proc of the 1st Int Conf on Trusted Computing and Trust in Information Technologies: Trusted Computing—Challenges and Applications. Berlin: Springer, 2008: 119132[11]Qin Jingjie, Shi Bin, Li Bo. NEM: A NEW InVM monitoring with high efficiency and strong isolation[C] Proc of Smart Computing and Communication. Berlin: Springer, 2018: 396405[12]李铭, 石磊, 牛文强, 等. 基于系统调用截获的虚拟机自省技术[J]. 信息安全研究, 2020, 6(4): 367372[13]廖振壹. 基于Xen虚拟化平台的安全监控框架研究[D]. 上海: 上海交通大学计算机科学与工程系, 2016
|