Follow
Christian Schneider
Title
Cited by
Cited by
Year
Nitro: hardware-based system call tracing for virtual machines
J Pfoh, C Schneider, C Eckert
Advances in Information and Computer Security, 96-112, 2011
1592011
A formal model for virtual machine introspection
J Pfoh, C Schneider, C Eckert
Proceedings of the 1st ACM workshop on Virtual machine security, 1-10, 2009
1282009
Exploiting the x86 architecture to derive virtual machine state information
J Pfoh, C Schneider, C Eckert
Proceedings of the 2010 Fourth International Conference on Emerging Security …, 2010
372010
Leveraging string kernels for malware detection
J Pfoh, C Schneider, C Eckert
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
342013
Bridging the Semantic Gap Through Static Code Analysis
C Schneider, J Pfoh, C Eckert
282012
X-TIER: Kernel Module Injection
S Vogl, F Kilic, C Schneider, C Eckert
Network and System Security, 192-205, 2013
232013
A Universal Semantic Bridge for Virtual Machine Introspection
C Schneider, J Pfoh, C Eckert
Information Systems Security, 370-373, 2011
192011
Smart Mobile Apps: Enabler oder Risiko?
C Eckert, C Schneider
Smart Mobile Apps: Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse …, 2011
92011
Enhancing control of service compositions in service-oriented architectures
C Schneider, F Stumpf, C Eckert
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
72009
Full Virtual Machine State Reconstruction for Security Applications
CA Schneider
Technische Universität München, 2013
42013
Wissenschaftliches Schreiben in LATEX
C Schneider
12009
The system can't perform the operation now. Try again later.
Articles 1–11