Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus …
Y Fu, Z Lin - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
It is generally believed to be a tedious, time consuming, and error-prone process to develop a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …
M Moffie, D Kaeli, A Cohen, J Aslam… - US Patent …, 2014 - Google Patents
An intrusion detection system collects architectural level events from a Virtual Machine Monitor where the collected events represent operation of a corresponding Virtual Machine …
WG McGee - US Patent 8,443,440, 2013 - Google Patents
Virtualization Software deployments are allowing organi Zations to achieve significant savings in their data centers. These savings are being gained in reduced energy and hard …
One of the most elusive types of malware in recent times that pose significant challenges in the computer security system is the kernel-level rootkits. The kernel-level rootkits can hide its …
A Saberi, Y Fu, Z Lin - Proceedings of the 21st annual network and …, 2014 - Citeseer
Recent advances show that it is possible to reuse the legacy binary code to bridge the semantic gap in virtual machine introspection (VMI). However, existing such VMI solutions …
Y Fu, Z Lin - ACM Transactions on Information and System Security …, 2013 - dl.acm.org
It is generally believed to be a tedious, time-consuming, and error-prone process to develop a virtual machine introspection (VMI) tool because of the semantic gap. Recent advance …
Modern malware like Stuxnet is complex and exploits multiple vulnerabilites in not only the user level processes but also the OS kernel to compromise a system. A main trait of such …
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity of …