M Bushouse, D Reeves - Proceedings of the Eighth ACM Conference on …, 2018 - dl.acm.org
Third-party software daemons called host agents are increasingly responsible for a modern host's security, automation, and monitoring tasks. Because of their location within the host …
TK Lengyel, T Kittel, C Eckert - … on Security in highly connected IT …, 2015 - sec.in.tum.de
In the recent years, virtual machine introspection has become a valuable technique for developing security applications for virtualized environments. With the increasing popularity …
A Luţaş, S Lukács, A Coleşa, D Luţaş - … August 24-26, 2015, Proceedings 8, 2015 - Springer
Hypervisor based memory introspection can greatly enhance the security and trustworthiness of endpoints. The memory introspection logic requires numerous memory …
In modern computer systems, complex legacy operating systems, such as Linux, are deployed ubiquitously. Many design choices in these legacy operating systems predate a …
Rootkits provide a collection of tools allowing for low level actions on a system. With these capabilities, attackers can gain full access of a computer and even modify the way the core …
This thesis investigates novel anti-forensic techniques for hiding malicious activity and proposes counter strategies for conducting robust digital analysis through virtualization …
Improving host security through virtualization has led to many novel “out-of-guest” Hypervisor-Based Security (HBS) systems. Unlike traditional operating-system-based …