The threat of virtualization: Hypervisor-based rootkits on the ARM architecture

R Buhren, J Vetter, J Nordholz - … 29–December 2, 2016, Proceedings 18, 2016 - Springer
The virtualization capabilities of today's systems offer rootkits excellent hideouts, where they
are fairly immune to countermeasures. In this paper, we evaluate the vulnerability to …

[PDF][PDF] 虚拟化软件栈安全研究

朱民, 涂碧波, 孟丹 - 计算机学报, 2017 - cjc.ict.ac.cn
摘要随着云计算的兴起, 虚拟化技术在IT 产业中得到了广泛应用. 政府, 企业和个人已将自身的
大量业务及其敏感数据转移到了云端的虚拟机中. 在虚拟化软件栈中, 虚拟机监控器具有最高 …

Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds

J **ao, L Lu, H Huang, H Wang - IEEE Transactions on Cloud …, 2018 - ieeexplore.ieee.org
In a virtualized environment, it is not difficult to retrieve guest OS information from its
hypervisor. However, it is very challenging to retrieve information in the reverse direction, ie …

Persisting Memcached with VM Memory Snapshot

D Li, X Tian, S Huang, H Liu, Y Tang… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Memory object caching system, such as Memcached, is being used popularly in speeding
up dynamic web applications by reducing database load. However, both policy and …

[PDF][PDF] 基于自适应机制的虚拟机进程实时监视方法

崔超远, **勇钢, 乌云, 孙丙宇 - 计算机学报, 2019 - cjc.ict.ac.cn
摘要系统虚拟化作为支撑云计算的关键技术, 其安全问题显得尤为重要. 在虚拟机外部对虚拟机
内部的进程进行监视, 可以使监视工具与不受信任的虚拟机隔离, 能够有效地监视虚拟机行为 …