Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

I Corona, G Giacinto, F Roli - Information sciences, 2013 - Elsevier
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …

Hypercheck: A hardware-assistedintegrity monitor

F Zhang, J Wang, K Sun… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The advent of cloud computing and inexpensive multi-core desktop architectures has led to
the widespread adoption of virtualization technologies. Furthermore, security researchers …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform

A Henderson, A Prakash, LK Yan, X Hu… - Proceedings of the …, 2014 - dl.acm.org
Dynamic binary analysis is a prevalent and indispensable technique in program analysis.
While several dynamic binary analysis tools and frameworks have been proposed, all suffer …

RansomSpector: An introspection-based approach to detect crypto ransomware

F Tang, B Ma, J Li, F Zhang, J Su, J Ma - Computers & Security, 2020 - Elsevier
Crypto ransomware encrypts user files and then extorts a ransom for decryption, thus it
brings a big threat to users. To address this problem, we propose RansomSpector, an …

[PDF][PDF] Secret: Secure channel between rich execution environment and trusted execution environment.

JS Jang, S Kong, M Kim, D Kim, BB Kang - NDSS, 2015 - cysec.kr
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a
role in kee** security-sensitive resources safe. However, to properly control access to the …

Management of supervisor mode execution protection (SMEP) by a hypervisor

I Pratt, R Wojtczuk - US Patent 9,292,328, 2016 - Google Patents
00 not support SMEP is executed within a virtual machine. A hypervisor instructs hardware
to enable SMEP for the virtual machine executing the guest operating system. When the …

Hecate: Lifting and shifting on-premises workloads to an untrusted cloud

X Ge, HC Kuo, W Cui - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Despite the recent exponential growth in cloud adoption, businesses that handle sensitive
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …