Fig. 10From: Hardware assisted hypervisor introspectionTop 15 abnormal-sequences of the suspicious processBack to article page