Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

RansomSpector: An introspection-based approach to detect crypto ransomware

F Tang, B Ma, J Li, F Zhang, J Su, J Ma - Computers & Security, 2020 - Elsevier
Crypto ransomware encrypts user files and then extorts a ransom for decryption, thus it
brings a big threat to users. To address this problem, we propose RansomSpector, an …

Hecate: Lifting and shifting on-premises workloads to an untrusted cloud

X Ge, HC Kuo, W Cui - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Despite the recent exponential growth in cloud adoption, businesses that handle sensitive
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …

Virtual machine introspection: Techniques and applications

Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …

Privatezone: Providing a private execution environment using arm trustzone

J Jang, C Choi, J Lee, N Kwak, S Lee… - … on Dependable and …, 2016 - ieeexplore.ieee.org
ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile
devices. However, the use of TrustZone is limited because TrustZone resources are only …

Mimosa: Reducing malware analysis overhead with coverings

M Ahmadi, K Leach, R Dougherty, S Forrest… - arXiv preprint arXiv …, 2021 - arxiv.org
There is a growing body of malware samples that evade automated analysis and detection
tools. Malware may measure fingerprints (" artifacts") of the underlying analysis tool or …

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

A Kumara, CD Jaidhar - Future Generation Computer Systems, 2018 - Elsevier
In order to fulfill the requirements like stringent timing restraints and demand on resources,
Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud …

An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …