Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

Hyperagents: Migrating host agents to the hypervisor

M Bushouse, D Reeves - Proceedings of the Eighth ACM Conference on …, 2018 - dl.acm.org
Third-party software daemons called host agents are increasingly responsible for a modern
host's security, automation, and monitoring tasks. Because of their location within the host …

[PDF][PDF] Virtual machine introspection with Xen on ARM

TK Lengyel, T Kittel, C Eckert - … on Security in highly connected IT …, 2015 - sec.in.tum.de
In the recent years, virtual machine introspection has become a valuable technique for
developing security applications for virtualized environments. With the increasing popularity …

Proposed processor extensions for significant speedup of hypervisor memory introspection

A Luţaş, S Lukács, A Coleşa, D Luţaş - … August 24-26, 2015, Proceedings 8, 2015 - Springer
Hypervisor based memory introspection can greatly enhance the security and
trustworthiness of endpoints. The memory introspection logic requires numerous memory …

Economically Protecting Complex, Legacy Operating Systems using Secure Design Principles

B Jain - 2022 - search.proquest.com
In modern computer systems, complex legacy operating systems, such as Linux, are
deployed ubiquitously. Many design choices in these legacy operating systems predate a …

[PDF][PDF] Identifying rootkit stealth strategies

E Mysliwietz, V Moonsamy - 2020 - cs.ru.nl
Rootkits provide a collection of tools allowing for low level actions on a system. With these
capabilities, attackers can gain full access of a computer and even modify the way the core …

Countering Anti-Forensics with Virtualization Technology

R Palutke - 2021 - search.proquest.com
This thesis investigates novel anti-forensic techniques for hiding malicious activity and
proposes counter strategies for conducting robust digital analysis through virtualization …

Cloud-Ready Hypervisor-Based Security

M Bushouse - 2018 - search.proquest.com
Improving host security through virtualization has led to many novel “out-of-guest”
Hypervisor-Based Security (HBS) systems. Unlike traditional operating-system-based …