A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Virtual machine introspection: Techniques and applications

Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …

T-vmi: Trusted virtual machine introspection in cloud environments

L Jia, M Zhu, B Tu - … Symposium on Cluster, Cloud and Grid …, 2017 - ieeexplore.ieee.org
Nowadays, the vulnerability of cloud environment exposed in security places Virtual
Machine Introspection (VMI) at risk: once attackers subvert any layers of cloud environment …

Derandomizing kernel address space layout for memory introspection and forensics

Y Gu, Z Lin - Proceedings of the Sixth ACM Conference on Data and …, 2016 - dl.acm.org
Modern OS kernels including Windows, Linux, and Mac OS all have adopted kernel Address
Space Layout Randomization (ASLR), which shifts the base address of kernel code and …

Business Hacking: A Case Study of Business Information Systems

DW Wright - 2023 - digitalcommons.liu.edu
This study aims to explore, understand, and explain the hacking of business information
systems (BIS) and the measures managers can take to secure their systems. Eight research …

Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud

Y Hebbal - 2017 - theses.hal.science
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor
layer which offers thanks to its location a strong visibility on their activities in addition to a …

[BOEK][B] Extracting invariants from binaries and its applications

Y Gu - 2016 - search.proquest.com
An invariant is a property that must hold at a certain point or all points during a program
execution. While the use of invariants has been widely studied in software engineering such …

[CITAAT][C] Toward guest OS writable virtual machine introspection

Z Lin - VMware Technical Journal, 2013

[CITAAT][C] Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud

MV MARANGOZOVA-MARTIN, MF LE MOUËL

[CITAAT][C] VMTJ Winter 2013

P Analyzing