Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world

AM Azab, P Ning, J Shah, Q Chen, R Bhutkar… - Proceedings of the …, 2014 - dl.acm.org
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …

Secure virtualization for cloud computing

F Lombardi, R Di Pietro - Journal of network and computer applications, 2011 - Elsevier
Cloud computing adoption and diffusion are threatened by unresolved security issues that
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …

Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

Z Wang, X Jiang - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …

Systems and methods for providing network access control in virtual environments

S Sawhney, M Conover, B Montague - US Patent 8,938,782, 2015 - Google Patents
BACKGROUND The managed State of an organizations individual end points may play a
critical role in the overall security and availability of its Information Technology (IT) infrastruc …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

Virtuoso: Narrowing the semantic gap in virtual machine introspection

B Dolan-Gavitt, T Leek, M Zhivich… - 2011 IEEE symposium …, 2011 - ieeexplore.ieee.org
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …

Hypersentry: enabling stealthy in-context measurement of hypervisor integrity

AM Azab, P Ning, Z Wang, X Jiang, X Zhang… - Proceedings of the 17th …, 2010 - dl.acm.org
This paper presents HyperSentry, a novel framework to enable integrity measurement of a
running hypervisor (or any other highest privileged software layer on a system). Unlike …

Secure in-vm monitoring using hardware virtualization

MI Sharif, W Lee, W Cui, A Lanzi - … of the 16th ACM conference on …, 2009 - dl.acm.org
Kernel-level attacks or rootkits can compromise the security of an operating system by
executing with the privilege of the kernel. Current approaches use virtualization to gain …