Security issues and challenges for virtualization technologies

F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …

Dksm: Subverting virtual machine introspection for fun and profit

S Bahram, X Jiang, Z Wang, M Grace… - 2010 29th IEEE …, 2010 - ieeexplore.ieee.org
Virtual machine (VM) introspection is a powerful technique for determining the specific
aspects of guest VM execution from outside the VM. Unfortunately, existing introspection …

HideM: Protecting the contents of userspace memory in the face of disclosure vulnerabilities

J Gionta, W Enck, P Ning - Proceedings of the 5th ACM Conference on …, 2015 - dl.acm.org
Memory disclosure vulnerabilities have become a common component for enabling reliable
exploitation of systems by leaking the contents of executable data. Previous research …

Developing a multi-level intrusion detection system using hybrid-DBN

AA Süzen - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
In this study, a hybrid deep belief network (DBN) cyber intrusion detection system was
proposed to provide a secure network by controlling network traffic in Industrial control …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …

SQLProb: a proxy-based architecture towards preventing SQL injection attacks

A Liu, Y Yuan, D Wijesekera, A Stavrou - Proceedings of the 2009 ACM …, 2009 - dl.acm.org
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control
code, used against Database-connected Web applications. To curtail the attackers' ability to …

Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology

S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to
manipulate the standard program execution path, resulting in abnormal processor …

Control flow integrity based on lightweight encryption architecture

P Qiu, Y Lyu, J Zhang, D Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Control-flow integrity (CFI) plays a very important role in defending against code reuse
attacks by protecting the control flows of programs from being hijacked. However, previous …

Robust DMR and multi-rate adaptive beamforming

H Cox, R Pitre - Conference Record of the Thirty-First Asilomar …, 1997 - ieeexplore.ieee.org
Dominant mode rejection (DMR) is an approach to adaptive beamforming in which only the
large eigenvalues of the correlation matrix and their eigenvectors are used. It requires fewer …

Moving the code to the data-dynamic code deployment using activespaces

C Docan, M Parashar, J Cummings… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Managing the large volumes of data produced by emerging scientific and engineering
simulations running on leadership-class resources has become a critical challenge. The …