A taxonomy of virtualization security issues in cloud computing environments

NM Almutairy, KHA Al-Shqeerat… - Indian Journal of Science …, 2019 - ssoar.info
Objectives: To identify the main challenges and security issues of virtualization in cloud
computing environments. It reviews the alleviation techniques for improving the security of …

RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM

M Guri - Nordic Conference on Secure IT Systems, 2023 - Springer
Air-gapped systems are physically separated from external networks, including the Internet.
This isolation is achieved by kee** the air-gap computers disconnected from wired or …

Virtual wall: Filtering rootkit attacks to protect linux kernel functions

YG Li, YC Chung, K Hwang, YJ Li - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Linux servers are being used in almost all clouds, datacenters and supercomputers today.
Linux Kernel functions are facing a kind of malware attacks, known as rootkits with root …

General and fast inter-process communication via bypassing privileged software

Z Mi, H Zhuang, B Zang, H Chen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
IPC (Inter-Process Communication) is a widely used operating system (OS) technique that
allows one process to invoke the services of other processes. The IPC participants may …

[PDF][PDF] VMIaaS: Virtual Machine Introspection as a Service

S Sentanoe - 2024 - opus4.kobv.de
In this digital era, communication in the digital world is becoming part of our daily lives. One
key technology that becomes part of this digital transformation is cloud computing. It allows …

Finding the Optimal Virtual Machine Setup for Nested Virtualization

P Mohan, P Narayan - 2021 12th International Conference on …, 2021 - ieeexplore.ieee.org
In this paper, we have conducted a thorough comparative analysis of the nested state
between the two most popular hypervisors in the world today, which are Oracle's VirtualBox …

TrapMP: malicious process detection by utilising program phase detection

Z Allaf, M Adda, A Gegov - … on Cyber Security and Protection of …, 2019 - ieeexplore.ieee.org
Hardware and software have failed to securely man-age the sensitive elements of
cryptographic algorithms in computational environment due to memory contentions. This …

[PDF][PDF] Enhancement of Security Mechanism In Virtualization Environment

DM Tank - 2022 - gtusitecirculars.s3.amazonaws.com
Virtualization is a vital innovation to empower distributed computing. Virtualization makes
and runs different Virtual Machines (VMs) on a solitary physical machine utilizing Virtual …

A virtualization based system infrastructure for dynamic program analysis

J HONG - 2020 - ink.library.smu.edu.sg
Dynamic malware analysis schemes either run the target program as is in an isolated
environment assisted by additional hardware facilities or modify it with instrumentation code …

Memory protection in hypervisor environments

A Kaul, K Narayanam, K Kumar… - US Patent 11,726,922, 2023 - Google Patents
Methods, systems, and computer program products for memory protection in hypervisor
environments are provided herein. A method includes maintaining, by a memory …