Cyber security threats, challenges and defence mechanisms in cloud computing

A Aljumah, TA Ahanger - IET communications, 2020 - Wiley Online Library
With the advent of computers and their widespread use, cloud computing has been
identified as one of the major emerging components of computer technology. The benefits of …

{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents

F Schwarz, C Rossow - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …

Remote direct memory introspection

H Liu, J **ng, Y Huang, D Zhuo, S Devadas… - 32nd USENIX Security …, 2023 - usenix.org
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …

BiSHM: Evidence detection and preservation model for cloud forensics

P Purnaye, V Kulkarni - Open Computer Science, 2022 - degruyter.com
The cloud market is growing every day. So are cloud crimes. To investigate crimes that
happen in a cloud environment, an investigation is carried out adhering to the court of law …

TEE-based designs for network gateways, web authentication, and VM introspection

FF Schwarz - 2024 - publikationen.sulb.uni-saarland.de
Over the last decades, the complexity of client, server, and network devices has drastically
increased---and so has the number of sophisticated attacks against them. New …

[PDF][PDF] Remote Direct Memory Introspection

HLJXYH DanyangZhuo, S Devadas, A Chen - people.csail.mit.edu
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …

[CITATION][C] D1. 2: ASSURED REFERENCE ARCHITECTURE

D Papamartzivanos, T Giannetsos, K Liang - 2020