Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Malware detection using machine learning based analysis of virtual memory access patterns
Malicious software, referred to as malware, continues to grow in sophistication. Past
proposals for malware detection have primarily focused on software-based detectors which …
proposals for malware detection have primarily focused on software-based detectors which …
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …
their early stages becomes virtually impossible. Instead, an attack investigation or …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …
RusTEE: develo** memory-safe ARM TrustZone applications
In the past decade, Trusted Execution Environment (TEE) provided by ARM TrustZone is
becoming one of the primary techniques for enhancing the security of mobile devices. The …
becoming one of the primary techniques for enhancing the security of mobile devices. The …
Atra: Address translation redirection attack against hardware-based external monitors
Hardware-based external monitors have been proposed as a trustworthy method for
protecting the kernel integrity. We introduce the design and implementation of Address …
protecting the kernel integrity. We introduce the design and implementation of Address …
A Survey of Hardware Improvements to Secure Program Execution
Hardware has been constantly augmented for security considerations since the advent of
computers. There is also a common perception among computer users that hardware does a …
computers. There is also a common perception among computer users that hardware does a …
Concurrent and consistent virtual machine introspection with hardware transactional memory
Y Liu, Y **a, H Guan, B Zang… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Virtual machine introspection, which provides tamperresistant, high-fidelity “out of the box”
monitoring of virtual machines, has many prominent security applications including VM …
monitoring of virtual machines, has many prominent security applications including VM …