Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing

R Riley, X Jiang, D Xu - Recent Advances in Intrusion Detection: 11th …, 2008 - Springer
Kernel rootkits pose a significant threat to computer systems as they run at the highest
privilege level and have unrestricted access to the resources of their victims. Many current …

Automated detection of persistent kernel control-flow attacks

NL Petroni Jr, M Hicks - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
This paper presents a new approach to dynamically monitoring operating system kernel
integrity, based on a property called state-based control-flow integrity (SBCFI). Violations of …

[PDF][PDF] Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms

R Hund, T Holz, FC Freiling - USENIX security symposium, 2009 - usenix.org
Protecting the kernel of an operating system against attacks, especially injection of malicious
code, is an important factor for implementing secure operating systems. Several kernel …

Exploitation techniques for data-oriented attacks with existing and potential defense approaches

L Cheng, S Ahmed, H Liljestrand, T Nyman… - ACM Transactions on …, 2021 - dl.acm.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

Software-defined mobile networks security

M Chen, Y Qian, S Mao, W Tang, X Yang - Mobile Networks and …, 2016 - Springer
The future 5G wireless is triggered by the higher demand on wireless capacity. With
Software Defined Network (SDN), the data layer can be separated from the control layer …

Rootkits on smart phones: attacks, implications and opportunities

J Bickford, R O'Hare, A Baliga, V Ganapathy… - Proceedings of the …, 2010 - dl.acm.org
Smart phones are increasingly being equipped with operating systems that compare in
complexity with those on desktop computers. This trend makes smart phone operating …

Ensuring operating system kernel integrity with OSck

OS Hofmann, AM Dunn, S Kim, I Roy… - ACM SIGARCH Computer …, 2011 - dl.acm.org
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat
to system security. This paper presents OSck, a system that discovers kernel rootkits by …

Automatic inference and enforcement of kernel data structure invariants

A Baliga, V Ganapathy, L Iftode - 2008 Annual Computer …, 2008 - ieeexplore.ieee.org
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve
a variety of malicious goals. While early rootkits modified control data structures, such as the …

Detecting kernel-level rootkits using data structure invariants

A Baliga, V Ganapathy, L Iftode - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Rootkits affect system security by modifying kernel data structures to achieve a variety of
malicious goals. While early rootkits modified control data structures, such as the system call …