A taxonomy of virtualization security issues in cloud computing environments
NM Almutairy, KHA Al-Shqeerat… - Indian Journal of Science …, 2019 - ssoar.info
Objectives: To identify the main challenges and security issues of virtualization in cloud
computing environments. It reviews the alleviation techniques for improving the security of …
computing environments. It reviews the alleviation techniques for improving the security of …
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
M Guri - Nordic Conference on Secure IT Systems, 2023 - Springer
Air-gapped systems are physically separated from external networks, including the Internet.
This isolation is achieved by kee** the air-gap computers disconnected from wired or …
This isolation is achieved by kee** the air-gap computers disconnected from wired or …
Virtual wall: Filtering rootkit attacks to protect linux kernel functions
Linux servers are being used in almost all clouds, datacenters and supercomputers today.
Linux Kernel functions are facing a kind of malware attacks, known as rootkits with root …
Linux Kernel functions are facing a kind of malware attacks, known as rootkits with root …
General and fast inter-process communication via bypassing privileged software
IPC (Inter-Process Communication) is a widely used operating system (OS) technique that
allows one process to invoke the services of other processes. The IPC participants may …
allows one process to invoke the services of other processes. The IPC participants may …
[PDF][PDF] VMIaaS: Virtual Machine Introspection as a Service
S Sentanoe - 2024 - opus4.kobv.de
In this digital era, communication in the digital world is becoming part of our daily lives. One
key technology that becomes part of this digital transformation is cloud computing. It allows …
key technology that becomes part of this digital transformation is cloud computing. It allows …
Finding the Optimal Virtual Machine Setup for Nested Virtualization
P Mohan, P Narayan - 2021 12th International Conference on …, 2021 - ieeexplore.ieee.org
In this paper, we have conducted a thorough comparative analysis of the nested state
between the two most popular hypervisors in the world today, which are Oracle's VirtualBox …
between the two most popular hypervisors in the world today, which are Oracle's VirtualBox …
TrapMP: malicious process detection by utilising program phase detection
Hardware and software have failed to securely man-age the sensitive elements of
cryptographic algorithms in computational environment due to memory contentions. This …
cryptographic algorithms in computational environment due to memory contentions. This …
[PDF][PDF] Enhancement of Security Mechanism In Virtualization Environment
DM Tank - 2022 - gtusitecirculars.s3.amazonaws.com
Virtualization is a vital innovation to empower distributed computing. Virtualization makes
and runs different Virtual Machines (VMs) on a solitary physical machine utilizing Virtual …
and runs different Virtual Machines (VMs) on a solitary physical machine utilizing Virtual …
A virtualization based system infrastructure for dynamic program analysis
J HONG - 2020 - ink.library.smu.edu.sg
Dynamic malware analysis schemes either run the target program as is in an isolated
environment assisted by additional hardware facilities or modify it with instrumentation code …
environment assisted by additional hardware facilities or modify it with instrumentation code …
Memory protection in hypervisor environments
Methods, systems, and computer program products for memory protection in hypervisor
environments are provided herein. A method includes maintaining, by a memory …
environments are provided herein. A method includes maintaining, by a memory …