Classifying malware attacks in IaaS cloud environments

N Rakotondravony, B Taubmann, W Mandarawi… - Journal of Cloud …, 2017 - Springer
In the last few years, research has been motivated to provide a categorization and
classification of security concerns accompanying the growing adaptation of Infrastructure as …

Survey on access control mechanisms in cloud computing

G Karatas, A Akbulut - Journal of Cyber Security and …, 2018 - journals.riverpublishers.com
The benefits that Internet-based applications and services have given to the end user with
today's cloud computing technology are very remarkable. The distributed services instantly …

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

S Sentanoe, B Taubmann, HP Reiser - Secure IT Systems: 23rd Nordic …, 2018 - Springer
Secure Shell (SSH) is a preferred target for attacks, as it is frequently used with password-
based authentication, and weak passwords can be easily exploited using brute-force …

Realtime multi-party video conferencing service over information centric network

A Jangam, R Ravindran, A Chakraborti… - … on Multimedia & …, 2015 - ieeexplore.ieee.org
Current video conferencing design based on client-server or peer-to-peer architecture do
not scale to large number of users. ICN addresses this through network-based multicast built …

[HTML][HTML] KVMIveggur: Flexible, secure, and efficient support for self-service virtual machine introspection

S Sentanoe, T Dangl, HP Reiser - Forensic Science International: Digital …, 2022 - Elsevier
Virtual machine introspection (VMI) has evolved into a widely used technique for purposes
such as digital forensics, intrusion detection, and malware analysis. The recent integration of …

Towards hypervisor support for enhancing the performance of virtual machine introspection

B Taubmann, HP Reiser - … and Interoperable Systems: 20th IFIP WG 6.1 …, 2020 - Springer
Virtual machine introspection (VMI) is the process of external monitoring of virtual machines.
Previous work has demonstrated that VMI can contribute to the security of cloud …

Architecture for resource-aware vmi-based cloud malware analysis

B Taubmann, B Kolosnjaji - Proceedings of the 4th Workshop on Security …, 2017 - dl.acm.org
Virtual machine introspection (VMI) is a technology with many possible applications, such as
malware analysis and intrusion detection. However, this technique is resource intensive, as …

Tenant-oriented monitoring for customized security services in the cloud

H Zhou, H Ba, Y Wang, Z Wang, J Ma, Y Li, H Qiao - Symmetry, 2019 - mdpi.com
The dramatic proliferation of cloud computing makes it an attractive target for malicious
attacks. Increasing solutions resort to virtual machine introspection (VMI) to deal with …

Visualizing and controlling VMI-based malware analysis in IaaS cloud

N Rakotondravony, HP Reiser - 2016 IEEE 35th Symposium on …, 2016 - ieeexplore.ieee.org
Security in virtualized environment has known the support of different tools in the low-level
detection and analysis of malware. The in-guest tracing mechanisms are now capable of …

Furnace: Self-service tenant vmi for the cloud

M Bushouse, D Reeves - Research in Attacks, Intrusions, and Defenses …, 2018 - Springer
Abstract Although Virtual Machine Introspection (VMI) tools are increasingly capable,
modern multi-tenant cloud providers are hesitant to expose the sensitive hypervisor APIs …