Evolution of attacks, threat models, and solutions for virtualized systems
D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Inktag: Secure applications on an untrusted operating system
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-
assurance processes even in the presence of a malicious operating system. InkTag …
assurance processes even in the presence of a malicious operating system. InkTag …
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …
their early stages becomes virtually impossible. Instead, an attack investigation or …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters
This paper presents NumChecker, a new Virtual Machine Monitor (VMM) based framework
to detect control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker …
to detect control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker …
Protecting private keys against memory disclosure attacks using hardware transactional memory
Cryptography plays an important role in computer and communication security. In practical
implementations of cryptosystems, the cryptographic keys are usually loaded into the …
implementations of cryptosystems, the cryptographic keys are usually loaded into the …
Software fault isolation with API integrity and multi-principal modules
The security of many applications relies on the kernel being secure, but history suggests that
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …
Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-
level malwares. However, the existing external approaches have been limited to monitoring …
level malwares. However, the existing external approaches have been limited to monitoring …
Finding cracks in shields: On the security of control flow integrity mechanisms
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …
In the past decade, dozens of CFI mechanisms have been proposed by researchers …