Remote direct memory introspection
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review
M Mundt, H Baier - International Conference on Digital Forensics and …, 2024 - Springer
Whether it is an insider or an Advanced Persistent Threat (APT), sensitive data is being
stolen. This year's German Federal Office for Information Security (BSI) annual report …
stolen. This year's German Federal Office for Information Security (BSI) annual report …
On the Malware Detection Problem: Challenges & Novel Approaches
Many solutions to detect malware have been proposed over time, but effective and efficient
malware detection still remains an open problem. In this work, I take a look at some malware …
malware detection still remains an open problem. In this work, I take a look at some malware …
[PDF][PDF] Remote Direct Memory Introspection
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …
[PDF][PDF] A Cost-Model Argument for the Adoption of Hardware-Assisted Malware Detection
M Botacin, U Kosayev, A Yifrach - 2023 - researchgate.net
In this work, we answer the question: Is it worth adopting a hardwareassisted zero trust
monitoring solution? To answer it, we revisit a cost model for incident response and …
monitoring solution? To answer it, we revisit a cost model for incident response and …
[PDF][PDF] Detecting Memory Injections Using a Hardware Monitor
M Botacin, U Kosayev, A Yifrach - 2023 - researchgate.net
Memory injection is the current state-of-the-art malware attack technique. Injections are hard
to detect by current software-based AntiViruses (AVs) because monitoring operations …
to detect by current software-based AntiViruses (AVs) because monitoring operations …
[PDF][PDF] A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS)
NHF Beebe - 2024 - netlib.sandia.gov
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …