Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Figure 10

Process relationship diagram before VM escape behavior.