Nitro: hardware-based system call tracing for virtual machines J Pfoh, C Schneider, C Eckert Advances in Information and Computer Security, 96-112, 2011 | 160 | 2011 |
A formal model for virtual machine introspection J Pfoh, C Schneider, C Eckert Proceedings of the 1st ACM workshop on Virtual machine security, 1-10, 2009 | 128 | 2009 |
Exploiting the x86 architecture to derive virtual machine state information J Pfoh, C Schneider, C Eckert Proceedings of the 2010 Fourth International Conference on Emerging Security …, 2010 | 37 | 2010 |
Leveraging string kernels for malware detection J Pfoh, C Schneider, C Eckert Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 34 | 2013 |
Bridging the Semantic Gap Through Static Code Analysis C Schneider, J Pfoh, C Eckert | 28 | 2012 |
X-TIER: Kernel Module Injection S Vogl, F Kilic, C Schneider, C Eckert Network and System Security, 192-205, 2013 | 23 | 2013 |
A Universal Semantic Bridge for Virtual Machine Introspection C Schneider, J Pfoh, C Eckert Information Systems Security, 370-373, 2011 | 19 | 2011 |
Smart Mobile Apps: Enabler oder Risiko? C Eckert, C Schneider Smart Mobile Apps: Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse …, 2011 | 9 | 2011 |
Enhancing control of service compositions in service-oriented architectures C Schneider, F Stumpf, C Eckert Availability, Reliability and Security, 2009. ARES'09. International …, 2009 | 7 | 2009 |
Full Virtual Machine State Reconstruction for Security Applications CA Schneider Technische Universität München, 2013 | 4 | 2013 |
Wissenschaftliches Schreiben in LATEX C Schneider | 1 | 2009 |