Buhren, R., Vetter, J., & Nordholz, J. (2016). The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings, 376. https://doi.org/10.1007/978-3-319-50011-9_29
Chicago-Zitierstil (17. Ausg.)Buhren, Robert, Julian Vetter, und Jan Nordholz. "The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture." Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings 2016: 376. https://doi.org/10.1007/978-3-319-50011-9_29.
MLA-Zitierstil (9. Ausg.)Buhren, Robert, et al. "The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture." Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings, 2016, p. 376, https://doi.org/10.1007/978-3-319-50011-9_29.