Cloud security issues and challenges: A survey
A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …
amount of virtual storage. The main features of cloud computing is that the user does not …
Security in cloud computing: Opportunities and challenges
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
A study on data storage security issues in cloud computing
BT Rao - Procedia Computer Science, 2016 - Elsevier
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware
and software design and procurements. Because of cloud simplicity everyone is moving …
and software design and procurements. Because of cloud simplicity everyone is moving …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Comparison of server technologies using Kernel-based virtual machine and container virtualization
Nowadays, Information technology is rapidly developing including computer network
technology. One technology that plays an important role in the field of computer networks is …
technology. One technology that plays an important role in the field of computer networks is …
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
Virtual machine introspection: Techniques and applications
Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
Obfuscation resilient binary code reuse through trace-oriented programming
With the wide existence of binary code, it is desirable to reuse it in many security
applications, such as malware analysis and software patching. While prior approaches have …
applications, such as malware analysis and software patching. While prior approaches have …
Digtool: A {virtualization-based} framework for detecting kernel vulnerabilities
J Pan, G Yan, X Fan - … USENIX Security Symposium (USENIX Security 17 …, 2017 - usenix.org
Discovering vulnerabilities in operating system (OS) kernels and patching them is crucial for
OS security. However, there is a lack of effective kernel vulnerability detection tools …
OS security. However, there is a lack of effective kernel vulnerability detection tools …