References
- 김지연, 김형종, 박춘식, 김명주, "클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석 연구", 정보보호학회지, 제19권 제4호, 2009.8.
- "Security Guidance for Critical Areas of Focus in Cloud Computing", Cloud Security Alliance, April 2009.
- "TOP Threats to Cloud Computing v1.0", Cloud Security Alliance, March 2010.
- "Cloud Computing Benefits, risks and recommendations for information security", European Network and Information Security Agency, 2009.
- 박춘식, 김형종, 김명주, "클라우드컴퓨팅 보안 동향", 정보통신산업진흥원 주간기술동향, 통권 1432호, pp.25-35, 2010.2.10.
- C. Hoff, "The Four Horsemen of the Virtualization Security Apocalypse".
- http://www.vmware.com.
- http://www.xen.org/.
- P. Ferrie, "Attacks on Virtual Machine Emulators", Symantec Advanced Threat Research.
- J. Rutkowska, "Subverting Vista Kernel For Fun and Profit", Black Hat USA 2006.
- J. Rutkowska, "Bluepilling the Xen Hypervisor", Black Hat USA 2008.
- S. T. King, "SubVirt: Implementing malware with virtual machines", IEEE Security and Privacy 2006.
- http://www.microsoft.com/windows/virtual-pc/.