Hiding Virtualization from Attackers and Malware | IEEE Journals & Magazine | IEEE Xplore