Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …
Secure virtualization for cloud computing
Cloud computing adoption and diffusion are threatened by unresolved security issues that
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
Systems and methods for providing network access control in virtual environments
S Sawhney, M Conover, B Montague - US Patent 8,938,782, 2015 - Google Patents
BACKGROUND The managed State of an organizations individual end points may play a
critical role in the overall security and availability of its Information Technology (IT) infrastruc …
critical role in the overall security and availability of its Information Technology (IT) infrastruc …
Malware investigation by analyzing computer memory
M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …
computing device. The method can include performing static analysis on code for a software …
Virtuoso: Narrowing the semantic gap in virtual machine introspection
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a
running hypervisor (or any other highest privileged software layer on a system). Unlike …
running hypervisor (or any other highest privileged software layer on a system). Unlike …
Secure in-vm monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by
executing with the privilege of the kernel. Current approaches use virtualization to gain …
executing with the privilege of the kernel. Current approaches use virtualization to gain …