A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

Z Wang, X Jiang - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

I Corona, G Giacinto, F Roli - Information sciences, 2013 - Elsevier
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …

Countering kernel rootkits with lightweight hook protection

Z Wang, X Jiang, W Cui, P Ning - … of the 16th ACM conference on …, 2009 - dl.acm.org
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide
their presence and activities, many rootkits hijack control flows by modifying control data or …

Defeating return-oriented rootkits with "Return-Less" kernels

J Li, Z Wang, X Jiang, M Grace, S Bahram - Proceedings of the 5th …, 2010 - dl.acm.org
Targeting the operating system (OS) kernel, kernel rootkits pose a formidable threat to
computer systems and their users. Recent efforts have made significant progress in blocking …

A lightweight live memory forensic approach based on hardware virtualization

Y Cheng, X Fu, X Du, B Luo, M Guizani - Information Sciences, 2017 - Elsevier
The results of memory forensics can not only be used as evidence in court but are also
beneficial for analyzing vulnerability and improving security. Thus, memory forensics has …

Securing display path for security-sensitive applications on mobile devices

J Cui, Y Zhang, Z Cai, A Liu… - Computers, Materials and …, 2018 - ink.library.smu.edu.sg
While smart devices based on ARM processor bring us a lot of convenience, they also
become an attractive target of cyber-attacks. The threat is exaggerated as commodity OSes …

V2e: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis

LK Yan, M Jayachandra, M Zhang, H Yin - Proceedings of the 8th ACM …, 2012 - dl.acm.org
A transparent and extensible malware analysis platform is essential for defeating malware.
This platform should be transparent so malware cannot easily detect and bypass it. It should …

A survey of malware behavior description and analysis

B Yu, Y Fang, Q Yang, Y Tang, L Liu - Frontiers of Information Technology …, 2018 - Springer
Behavior-based malware analysis is an important technique for automatically analyzing and
detecting malware, and it has received considerable attention from both academic and …