Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Figure 3

Memory analysis method for HM.