Economics C. 2007 malware report: the economic impact of viruses, spyware, adware, botnests and other malicious code. Tech Rep, 2007.
[2]
Hex-Rays D. SA/NV. IDA Pro disassembler and debugger. (2010).
[3]
Dinaburg A, Royal P, Sharif M I, et al. Ether: malware analysis via hardware virtualization extensions//ACM CCS 2008. New York: ACM, 2008: 51-62.
[4]
Barham P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization//SOSP2003. Bolton Landing: , 2003: 164-177.
[5]
Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection//ACSAC 2007. Miami Beach:, 2007: 421-430.
[6]
Bayer U, Moser A, Kruegel C, et al. Dynamic analysis of malicious code[J]. J Comput Virol, 2006, 2(1): 67-77.
[7]
Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis//SP07. Berkeley:, 2007: 231-245.
[8]
Ferrie P. Attacks on virtual machine emulators//AVAR2006. Auckland:,2006: 128-143.
[9]
Garfinkel T, Adams K, Warfield A, et al. Compatibility is not transparency: VMM detection myths and realities//USENIX HotOS2007. San Diego: , 2007:1-6.
[10]
Azagury A, Factor M E, Satran J. Point-in-time copy: yesterday, today and tomorrow//MSST02. Maryland: , 2002: 259-270.
[11]
Muniswamy-Reddy K K, Wright C P, Himmer A, et al. A versatile and user-oriented versioning file system//FAST04. Francisco: , 2004: 115-128.