Improving Xen security through disaggregation

DG Murray, G Milos, S Hand - Proceedings of the fourth ACM SIGPLAN …, 2008 - dl.acm.org
Virtual machine monitors (VMMs) have been hailed as the basis for an increasing number of
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …

Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?

N Virvilis, D Gritzalis… - 2013 IEEE 10th …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber attacks continuously increase, it is
becoming evident that traditional security mechanisms have limited success in detecting …

Method and apparatus for migrating virtual trusted platform modules

VR Scarlata - US Patent 8,074,262, 2011 - Google Patents
BACKGROUND A conventional processing system may include hardware resources, such
as a central processing unit (CPU) and ran dom access memory (RAM), as well as Software …

Collabra: a xen hypervisor based collaborative intrusion detection system

S Bharadwaja, W Sun, M Niamat… - 2011 Eighth …, 2011 - ieeexplore.ieee.org
In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen
hyper visors to maintain the security of the cloud based on virtualized network. While the …

Security-preserving live migration of virtual machines in the cloud

F Zhang, H Chen - Journal of network and systems management, 2013 - Springer
Hypervisor-based process protection is a novel approach that provides isolated execution
environments for applications running on untrusted commodity operating systems. It is …

PALM: security preserving VM live migration for systems with VMM-enforced protection

F Zhang, Y Huang, H Wang, H Chen… - 2008 Third Asia-Pacific …, 2008 - ieeexplore.ieee.org
Live migration of virtual machine (VM) is a desirable feature for distributed computing such
as grid computing and recent cloud computing by facilitating fault tolerance, load balance …

Diverter: A new approach to networking within virtualized infrastructures

A Edwards, A Fischer, A Lain - Proceedings of the 1st ACM workshop on …, 2009 - dl.acm.org
As virtualized data-centres become the back-end platforms behind a new generation of
utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy …

Trusted Virtual Domains–design, implementation and lessons learned

L Catuogno, A Dmitrienko, K Eriksson… - Trusted Systems: First …, 2010 - Springer
Abstract A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (eg,
network, storage) that are distributed over multiple physical platforms and share a common …

Trusted computing: Security and applications

E Gallery, CJ Mitchell - Cryptologia, 2009 - Taylor & Francis
The main objective of this paper is to highlight some of the major security and application
issues confronting trusted computing technology. This technology—now present in a large …

Enhancing data privacy and integrity in the cloud

J Naruchitparames, MH Güneş - … International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing is a new computing paradigm in which dynamically scalable resources are
provided as a service over the Internet. One central concern in cloud computing is the …