Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Inktag: Secure applications on an untrusted operating system

OS Hofmann, S Kim, AM Dunn, MZ Lee… - Proceedings of the …, 2013 - dl.acm.org
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-
assurance processes even in the presence of a malicious operating system. InkTag …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters

X Wang, R Karri - Proceedings of the 50th annual design automation …, 2013 - dl.acm.org
This paper presents NumChecker, a new Virtual Machine Monitor (VMM) based framework
to detect control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker …

Protecting private keys against memory disclosure attacks using hardware transactional memory

L Guan, J Lin, B Luo, J **g… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Cryptography plays an important role in computer and communication security. In practical
implementations of cryptosystems, the cryptographic keys are usually loaded into the …

Software fault isolation with API integrity and multi-principal modules

Y Mao, H Chen, D Zhou, X Wang, N Zeldovich… - Proceedings of the …, 2011 - dl.acm.org
The security of many applications relies on the kernel being secure, but history suggests that
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …

Ki-mon arm: A hardware-assisted event-triggered monitoring platform for mutable kernel object

H Lee, H Moon, I Heo, D Jang, J Jang… - … on Dependable and …, 2017 - ieeexplore.ieee.org
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-
level malwares. However, the existing external approaches have been limited to monitoring …

Finding cracks in shields: On the security of control flow integrity mechanisms

Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …