Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Figure 11

Process relationship diagram after VM escape behavior.