D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services and resources. Even if the benefits in terms of performance, maintenance, and cost are …
The threats malware pose to the people around the world are increasing rapidly. A software that sneaks to your computer system without your knowledge with a harmful intent to disrupt …
T Shinagawa, H Eiraku, K Tanimoto, K Omote… - Proceedings of the …, 2009 - dl.acm.org
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous …
Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud …
Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level …
M Moffie, D Kaeli, A Cohen, J Aslam… - US Patent …, 2014 - Google Patents
An intrusion detection system collects architectural level events from a Virtual Machine Monitor where the collected events represent operation of a corresponding Virtual Machine …
H Kim, H Lim, J Jeong, H Jo, J Lee - … of the 2009 ACM SIGPLAN/SIGOPS …, 2009 - dl.acm.org
The use of virtualization is progressively accommodating diverse and unpredictable workloads as being adopted in virtual desktop and cloud computing environments. Since a …
B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …