SLIDE 36 36
SW Laboratories, CTO, Samsung Electronics SW Laboratories, CTO, Samsung Electronics
References References
[COK06] G. Coker, [COK06] G. Coker, “ “Xen Xen Security Modules (XSM), Security Modules (XSM),” ” Xen Xen Summit, Summit, 2006. 2006.
[GOS06] A. [GOS06] A. Gostev Gostev, , “ “Mobile Mobile Malware Malware Evolution: An Overview, Part Evolution: An Overview, Part
1, 1,” ” 2006. 2006. http://www.viruslist.com/en/analysis?pubid=200119916 http://www.viruslist.com/en/analysis?pubid=200119916 [KAW05] D. Kawamoto, [KAW05] D. Kawamoto, “ “2006: Year of the mobile 2006: Year of the mobile malware malware, ,” ” 2005. 2005. http://news.com.com/2006+Year+of+the+mobile+malware/2100 http://news.com.com/2006+Year+of+the+mobile+malware/2100-
7349_3-
6001651.html [SAI05] R. [SAI05] R. Sailer Sailer, E. Valdez, T. Jaeger, R. Perez, L. van , E. Valdez, T. Jaeger, R. Perez, L. van Doorn Doorn, J. , J.
- L. Griffin, and S. Berger.
- L. Griffin, and S. Berger. “
“sHype:A sHype:A secure secure hypervisor hypervisor approach approach to trusted virtualized systems, to trusted virtualized systems,” ” IBM Research Report, 2005. IBM Research Report, 2005. [ARM01] Andres [ARM01] Andres N.Sloss N.Sloss, Dominic , Dominic Symes Symes, , C.Wright C.Wright. . “ “ARM ARM System Developer System Developer’ ’s Guide s Guide” ”, Morgan Kaufmann, 2004 , Morgan Kaufmann, 2004 [KEV01] Kevin Lawton, [KEV01] Kevin Lawton, “ “Running multiple operating systems Running multiple operating systems concurrently on an IA32 PC using virtualization techniques concurrently on an IA32 PC using virtualization techniques” ”. . 2000. 2000.