Security and privacy in cloud computing
Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
Kernel rootkits pose a significant threat to computer systems as they run at the highest
privilege level and have unrestricted access to the resources of their victims. Many current …
privilege level and have unrestricted access to the resources of their victims. Many current …
Automated detection of persistent kernel control-flow attacks
NL Petroni Jr, M Hicks - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
This paper presents a new approach to dynamically monitoring operating system kernel
integrity, based on a property called state-based control-flow integrity (SBCFI). Violations of …
integrity, based on a property called state-based control-flow integrity (SBCFI). Violations of …
[PDF][PDF] Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
Protecting the kernel of an operating system against attacks, especially injection of malicious
code, is an important factor for implementing secure operating systems. Several kernel …
code, is an important factor for implementing secure operating systems. Several kernel …
Exploitation techniques for data-oriented attacks with existing and potential defense approaches
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …
without violating its control-flow integrity. It has been shown that such attacks can cause …
Software-defined mobile networks security
The future 5G wireless is triggered by the higher demand on wireless capacity. With
Software Defined Network (SDN), the data layer can be separated from the control layer …
Software Defined Network (SDN), the data layer can be separated from the control layer …
Rootkits on smart phones: attacks, implications and opportunities
Smart phones are increasingly being equipped with operating systems that compare in
complexity with those on desktop computers. This trend makes smart phone operating …
complexity with those on desktop computers. This trend makes smart phone operating …
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat
to system security. This paper presents OSck, a system that discovers kernel rootkits by …
to system security. This paper presents OSck, a system that discovers kernel rootkits by …
Automatic inference and enforcement of kernel data structure invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve
a variety of malicious goals. While early rootkits modified control data structures, such as the …
a variety of malicious goals. While early rootkits modified control data structures, such as the …
Detecting kernel-level rootkits using data structure invariants
Rootkits affect system security by modifying kernel data structures to achieve a variety of
malicious goals. While early rootkits modified control data structures, such as the system call …
malicious goals. While early rootkits modified control data structures, such as the system call …