1 R. Jalan, "Trin-trin : Who's calling? A pin-based dynamic call graph extraction framework" 40 (40): 410-442, 2012
2 S. Ribić, "Tiny operating system kernel for education purposes" 700-705, 2015
3 S. Eresheim, "The evolution of process hiding techniques in malware-current threats and possible countermeasures" 25 (25): 866-874, 2017
4 SystemTap, "Systemtap wiki"
5 X. -Y. Sun, "Research on sequence of function calls based on gprof" 26 (26): 165-166, 2010
6 O. Levi, "Pin - A dynamic binary instrumentation tool"
7 R. K. Barik, "Performance analysis of virtual machines and containers in cloud computing" 1204-1210, 2016
8 C. -T. Yang, "On improvement of cloud virtual machine availability with virtualization fault tolerance mechanism" 69 (69): 1103-1122, 2014
9 N. A. Carvalho, "Measuring software systems scalability for proactive data center management" 829-842, 2010
10 B. Gregg, "Linux performance profiling tool perf"
1 R. Jalan, "Trin-trin : Who's calling? A pin-based dynamic call graph extraction framework" 40 (40): 410-442, 2012
2 S. Ribić, "Tiny operating system kernel for education purposes" 700-705, 2015
3 S. Eresheim, "The evolution of process hiding techniques in malware-current threats and possible countermeasures" 25 (25): 866-874, 2017
4 SystemTap, "Systemtap wiki"
5 X. -Y. Sun, "Research on sequence of function calls based on gprof" 26 (26): 165-166, 2010
6 O. Levi, "Pin - A dynamic binary instrumentation tool"
7 R. K. Barik, "Performance analysis of virtual machines and containers in cloud computing" 1204-1210, 2016
8 C. -T. Yang, "On improvement of cloud virtual machine availability with virtualization fault tolerance mechanism" 69 (69): 1103-1122, 2014
9 N. A. Carvalho, "Measuring software systems scalability for proactive data center management" 829-842, 2010
10 B. Gregg, "Linux performance profiling tool perf"
11 Chaoyuan Cui, "Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism" 한국인터넷정보학회 11 (11): 1722-1741, 2017
12 R. Di Pietro, "From Database to Cyber Security" Springer 166-185, 2018
13 O. S. Hofmann, "Ensuring operating system kernel integrity with OSck" 46 (46): 279-290, 2011
14 A. Feldthaus, "Efficient construction of approximate call graphs for Javascript IDE services" 752-761, 2013
15 F. Zyulkyarov, "Debugging programs that use atomic blocks and transactional memory" 45 (45): 57-66, 2010
16 D. de Oliveira, "Comparative analysis of trace tools for real-time Linux" 12 (12): 1134-1140, 2014
17 A. Singh, "Cloud security issues and challenges : A survey" 79 : 88-115, 2017
18 M. Chabbi, "Call paths for pin tools" 76-86, 2014
19 T. Y. Win, "Big data based security analytics for protecting virtualized infrastructures in cloud computing" 4 (4): 11-25, 2017
20 R. Patil, "An exhaustive survey on security concerns and solutions at different components of virtualization" 52 (52): 12-, 2019
21 T. R. Toma, "An efficient mechanism of generating call graph for Javascript using dynamic analysis in web application" 1-6, 2014
22 R. Luh, "AIDIS : Detecting and classifying anomalous behavior in ubiquitous kernel processes" 84 : 120-147, 2019
23 P. Bhat, "A survey on various threats and current state of security in Android platform" 52 (52): 21-, 2019
24 A. Lee, "A review of popular reverse engineering tools from a novice perspective" 68-74, 2018
25 A. Damodaran, "A comparison of static, dynamic, and hybrid analysis for malware detection" 13 (13): 1-12, 2017
26 A. Arusoaie, "A comparison of open-source static analysis tools for vulnerability detection in C/C++ code" 161-168, 2017