Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

A study on data storage security issues in cloud computing

BT Rao - Procedia Computer Science, 2016 - Elsevier
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware
and software design and procurements. Because of cloud simplicity everyone is moving …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Comparison of server technologies using Kernel-based virtual machine and container virtualization

R Satra, L Syafie, M Tubagus - AIP Conference Proceedings, 2023 - pubs.aip.org
Nowadays, Information technology is rapidly developing including computer network
technology. One technology that plays an important role in the field of computer networks is …

PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace

Y Gu, Q Zhao, Y Zhang, Z Lin - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …

Virtual machine introspection: Techniques and applications

Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …

Obfuscation resilient binary code reuse through trace-oriented programming

J Zeng, Y Fu, KA Miller, Z Lin, X Zhang… - Proceedings of the 2013 …, 2013 - dl.acm.org
With the wide existence of binary code, it is desirable to reuse it in many security
applications, such as malware analysis and software patching. While prior approaches have …

Digtool: A {virtualization-based} framework for detecting kernel vulnerabilities

J Pan, G Yan, X Fan - … USENIX Security Symposium (USENIX Security 17 …, 2017 - usenix.org
Discovering vulnerabilities in operating system (OS) kernels and patching them is crucial for
OS security. However, there is a lack of effective kernel vulnerability detection tools …