Remote direct memory introspection

H Liu, J **ng, Y Huang, D Zhuo, S Devadas… - 32nd USENIX Security …, 2023 - usenix.org
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …

Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review

M Mundt, H Baier - International Conference on Digital Forensics and …, 2024 - Springer
Whether it is an insider or an Advanced Persistent Threat (APT), sensitive data is being
stolen. This year's German Federal Office for Information Security (BSI) annual report …

On the Malware Detection Problem: Challenges & Novel Approaches

M Botacin, P de Geus, A Grégio - … de Segurança da Informação e de …, 2022 - sol.sbc.org.br
Many solutions to detect malware have been proposed over time, but effective and efficient
malware detection still remains an open problem. In this work, I take a look at some malware …

[PDF][PDF] Remote Direct Memory Introspection

HLJXYH DanyangZhuo, S Devadas, A Chen - people.csail.mit.edu
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …

[PDF][PDF] A Cost-Model Argument for the Adoption of Hardware-Assisted Malware Detection

M Botacin, U Kosayev, A Yifrach - 2023 - researchgate.net
In this work, we answer the question: Is it worth adopting a hardwareassisted zero trust
monitoring solution? To answer it, we revisit a cost model for incident response and …

[PDF][PDF] Detecting Memory Injections Using a Hardware Monitor

M Botacin, U Kosayev, A Yifrach - 2023 - researchgate.net
Memory injection is the current state-of-the-art malware attack technique. Injections are hard
to detect by current software-based AntiViruses (AVs) because monitoring operations …

[PDF][PDF] A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS)

NHF Beebe - 2024 - netlib.sandia.gov
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …