A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Virtual machine introspection: Techniques and applications
Y Hebbal, S Laniepce… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
at the hypervisor layer. This monitoring concept has gained recently a considerable focus in …
T-vmi: Trusted virtual machine introspection in cloud environments
L Jia, M Zhu, B Tu - … Symposium on Cluster, Cloud and Grid …, 2017 - ieeexplore.ieee.org
Nowadays, the vulnerability of cloud environment exposed in security places Virtual
Machine Introspection (VMI) at risk: once attackers subvert any layers of cloud environment …
Machine Introspection (VMI) at risk: once attackers subvert any layers of cloud environment …
Derandomizing kernel address space layout for memory introspection and forensics
Modern OS kernels including Windows, Linux, and Mac OS all have adopted kernel Address
Space Layout Randomization (ASLR), which shifts the base address of kernel code and …
Space Layout Randomization (ASLR), which shifts the base address of kernel code and …
Business Hacking: A Case Study of Business Information Systems
DW Wright - 2023 - digitalcommons.liu.edu
This study aims to explore, understand, and explain the hacking of business information
systems (BIS) and the measures managers can take to secure their systems. Eight research …
systems (BIS) and the measures managers can take to secure their systems. Eight research …
Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud
Y Hebbal - 2017 - theses.hal.science
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor
layer which offers thanks to its location a strong visibility on their activities in addition to a …
layer which offers thanks to its location a strong visibility on their activities in addition to a …
[BOEK][B] Extracting invariants from binaries and its applications
Y Gu - 2016 - search.proquest.com
An invariant is a property that must hold at a certain point or all points during a program
execution. While the use of invariants has been widely studied in software engineering such …
execution. While the use of invariants has been widely studied in software engineering such …
[CITAAT][C] Toward guest OS writable virtual machine introspection
Z Lin - VMware Technical Journal, 2013
[CITAAT][C] Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud
MV MARANGOZOVA-MARTIN, MF LE MOUËL