Evolution of attacks, threat models, and solutions for virtualized systems
D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma - Computers & Security, 2020 - Elsevier
Crypto ransomware encrypts user files and then extorts a ransom for decryption, thus it
brings a big threat to users. To address this problem, we propose RansomSpector, an …
brings a big threat to users. To address this problem, we propose RansomSpector, an …
Hecate: Lifting and shifting on-premises workloads to an untrusted cloud
Despite the recent exponential growth in cloud adoption, businesses that handle sensitive
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …
Virtual machine introspection: Techniques and applications
Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
Privatezone: Providing a private execution environment using arm trustzone
ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile
devices. However, the use of TrustZone is limited because TrustZone resources are only …
devices. However, the use of TrustZone is limited because TrustZone resources are only …
Mimosa: Reducing malware analysis overhead with coverings
There is a growing body of malware samples that evade automated analysis and detection
tools. Malware may measure fingerprints (" artifacts") of the underlying analysis tool or …
tools. Malware may measure fingerprints (" artifacts") of the underlying analysis tool or …
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
A Kumara, CD Jaidhar - Future Generation Computer Systems, 2018 - Elsevier
In order to fulfill the requirements like stringent timing restraints and demand on resources,
Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud …
Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud …
An exhaustive survey on security concerns and solutions at different components of virtualization
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …
additional vulnerabilities that can be exploited to affect the availability, integrity, and …