Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Malware detection using machine learning based analysis of virtual memory access patterns

Z Xu, S Ray, P Subramanyan… - Design, Automation & Test …, 2017 - ieeexplore.ieee.org
Malicious software, referred to as malware, continues to grow in sophistication. Past
proposals for malware detection have primarily focused on software-based detectors which …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes

Z Ling, H Yan, X Shao, J Luo, Y Xu, B Pearson… - Journal of Systems …, 2021 - Elsevier
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …

RusTEE: developing memory-safe ARM TrustZone applications

S Wan, M Sun, K Sun, N Zhang, X He - Proceedings of the 36th Annual …, 2020 - dl.acm.org
In the past decade, Trusted Execution Environment (TEE) provided by ARM TrustZone is
becoming one of the primary techniques for enhancing the security of mobile devices. The …

Atra: Address translation redirection attack against hardware-based external monitors

D Jang, H Lee, M Kim, D Kim, D Kim… - Proceedings of the 2014 …, 2014 - dl.acm.org
Hardware-based external monitors have been proposed as a trustworthy method for
protecting the kernel integrity. We introduce the design and implementation of Address …

Concurrent and consistent virtual machine introspection with hardware transactional memory

Y Liu, Y Xia, H Guan, B Zang… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Virtual machine introspection, which provides tamperresistant, high-fidelity “out of the box”
monitoring of virtual machines, has many prominent security applications including VM …

A Survey of Hardware Improvements to Secure Program Execution

L Zhao, H Shuang, S Xu, W Huang, R Cui… - ACM Computing …, 2024 - dl.acm.org
Hardware has been constantly augmented for security considerations since the advent of
computers. There is also a common perception among computer users that hardware does a …