Virtualization: Issues, security threats, and solutions

M Pearce, S Zeadally, R Hunt - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …

[PDF][PDF] 云计算安全: 架构, 机制与模型评价

林闯, 苏文博, 孟坤, 刘渠, 刘卫东 - 2013 - cjc.ict.ac.cn
摘要随着云计算服务的广泛使用, 租户对云计算的安全性提出了越来越高的要求,
云计算环境的动态性, 随机性, 复杂性和开放性使得原有安全方案难以适用, 这也阻碍了云计算的 …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

[PDF][PDF] A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis

R Sihwail, K Omar, KAZ Ariffin - Int. J. Adv. Sci. Eng. Inf. Technol, 2018 - academia.edu
The threats malware pose to the people around the world are increasing rapidly. A software
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …

Bitvisor: a thin hypervisor for enforcing i/o device security

T Shinagawa, H Eiraku, K Tanimoto, K Omote… - Proceedings of the …, 2009 - dl.acm.org
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for
implementing various security functionalities. However, traditional VMMs require numerous …

Security as a service model for cloud environment

V Varadharajan, U Tupakula - IEEE Transactions on network …, 2014 - ieeexplore.ieee.org
Cloud computing is becoming increasingly important for provision of services and storage of
data in the Internet. However there are several significant challenges in securing cloud …

Hypervisor support for identifying covertly executing binaries.

L Litty, HA Lagar-Cavilla, D Lie - USENIX Security Symposium, 2008 - usenix.org
Hypervisors have been proposed as a security tool to defend against malware that subverts
the OS kernel. However, hypervisors must deal with the semantic gap between the low-level …

VMM-based intrusion detection system

M Moffie, D Kaeli, A Cohen, J Aslam… - US Patent …, 2014 - Google Patents
An intrusion detection system collects architectural level events from a Virtual Machine
Monitor where the collected events represent operation of a corresponding Virtual Machine …

Task-aware virtual machine scheduling for I/O performance.

H Kim, H Lim, J Jeong, H Jo, J Lee - … of the 2009 ACM SIGPLAN/SIGOPS …, 2009 - dl.acm.org
The use of virtualization is progressively accommodating diverse and unpredictable
workloads as being adopted in virtual desktop and cloud computing environments. Since a …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …