= Academic Papers = * P. Doyle, M. Deegan, C. O’Driscoll, M. Gleeson, B. Gillespie:[[BR]]'''Ubiquitous Desktops with Multi-factor Authentication.'''[[BR]]In ''Proceedings of the Third International Conference on Digital Information Management (ICDIM 2008)'', London, United Kingdom, November 2008. * D. Cavalca, E. Goldoni:[[BR]]'''HIVE: an Open Infrastructure for Malware Collection and Analysis.'''[[BR]]In ''Proceedings of the 1st Workshop on Open Source Software for Computer and Network Forensics (ossconf08)'', Milan, Italy, September 2008. * R. Riley, X. Jiang, D. Xu:[[BR]]'''Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.'''[[BR]]In ''Recent Advances in Intrusion Detection'', LNCS 5230, Springer Berlin / Heidelberg, September 2008. * A. Wolbach, J. Harkes, S. Chellappa, M. Satyanarayanan:[[BR]]'''Transient Customization of Mobile Computing Infrastructure.'''[[BR]]''Technical Report CMU-CS-08-117'', School of Computer Science, Carnegie Mellon University, April 2008. * F. Camargos, G. Girard:[[BR]]'''Virtualization of Linux servers.'''[[BR]]In ''Proceedings of the Linux Symposium 2008'', Ottawa, Ontario, Canada, July 2008. * T. Werner:[[BR]]'''!VirtualBox im auswärtigen Amt.''' (Case study, slides in German)[[BR]]Presented at ''Frühjahrsfachgespräch 2008 of the German Unix User Group'', Munich, Germany, March 2008.