Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Figure 9

Cross-check result with VM process list obtained from different patterns.