A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

[PDF][PDF] A survey: Recent advances and future trends in honeypot research

ML Bringer, CA Chelmecki, H Fu**oki - International Journal of …, 2012 - mecs-press.org
This paper presents a survey on recent advances in honeypot research from a review of 80+
papers on honeypots and related topics mostly published after year 2005. This paper …

Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization

F Zhang, J Chen, H Chen, B Zang - Proceedings of the twenty-third acm …, 2011 - dl.acm.org
Multi-tenant cloud, which usually leases resources in the form of virtual machines, has been
commercially available for years. Unfortunately, with the adoption of commodity virtualized …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

{BareCloud}: Bare-metal analysis-based evasive malware detection

D Kirat, G Vigna, C Kruegel - 23rd USENIX Security Symposium …, 2014 - usenix.org
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts

N Miramirkhani, MP Appini, N Nikiforakis… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Malware sandboxes, widely used by antivirus companies, mobile application marketplaces,
threat detection appliances, and security researchers, face the challenge of environment …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

Lares: An architecture for secure active monitoring using virtualization

BD Payne, M Carbone, M Sharif… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Host-based security tools such as anti-virus and intrusion detection systems are not
adequately protected on today's computers. Malware is often designed to immediately …