Evolution of attacks, threat models, and solutions for virtualized systems
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
and resources. Even if the benefits in terms of performance, maintenance, and cost are …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …
Hypercheck: A hardware-assistedintegrity monitor
The advent of cloud computing and inexpensive multi-core desktop architectures has led to
the widespread adoption of virtualization technologies. Furthermore, security researchers …
the widespread adoption of virtualization technologies. Furthermore, security researchers …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
Dynamic binary analysis is a prevalent and indispensable technique in program analysis.
While several dynamic binary analysis tools and frameworks have been proposed, all suffer …
While several dynamic binary analysis tools and frameworks have been proposed, all suffer …
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma - Computers & Security, 2020 - Elsevier
Crypto ransomware encrypts user files and then extorts a ransom for decryption, thus it
brings a big threat to users. To address this problem, we propose RansomSpector, an …
brings a big threat to users. To address this problem, we propose RansomSpector, an …
[PDF][PDF] Secret: Secure channel between rich execution environment and trusted execution environment.
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a
role in kee** security-sensitive resources safe. However, to properly control access to the …
role in kee** security-sensitive resources safe. However, to properly control access to the …
Management of supervisor mode execution protection (SMEP) by a hypervisor
I Pratt, R Wojtczuk - US Patent 9,292,328, 2016 - Google Patents
00 not support SMEP is executed within a virtual machine. A hypervisor instructs hardware
to enable SMEP for the virtual machine executing the guest operating system. When the …
to enable SMEP for the virtual machine executing the guest operating system. When the …
Hecate: Lifting and shifting on-premises workloads to an untrusted cloud
Despite the recent exponential growth in cloud adoption, businesses that handle sensitive
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …
data (eg, health and financial sectors) are hesitant to migrate their on-premises IT …