Results 31 to 40 of about 13,965 (202)
Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory snapshots taken from a running system. Even though it is a relatively recent field, it is rapidly growing and it is attracting considerable attention from both industrial and academic researchers. In this paper, we present a set of techniques to extend
M. Graziano, A. Lanzi, D. Balzarotti
openaire +4 more sources
Nanovised Control Flow Attestation
This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices.
Raz Ben Yehuda +2 more
doaj +1 more source
HyBIS: Windows Guest Protection through Advanced Memory Introspection
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities.
C Mahapatra +8 more
core +1 more source
Model of Cloud Computing Realisation on the Base of Infrastructure IaaS
The paper deals with the problems of cloud computing applied for industrial applicationson the ground of practical experiences in certain manufacturing corporation.
Peter Peniak +2 more
doaj +1 more source
High availability of kernel-based virtual machine using nested virtualization
- KVM (Kernel-based Virtual Machine) is one of the popular, free and open-source virtual machine managers for Linux distributions. Many people or companies use plain KVM virtualization, but in many cases, they have no measures in place for ensuring ...
Sini S. Nair, T. Santha
doaj +1 more source
H-KPP: Hypervisor-Assisted Kernel Patch Protection
We present H-KPP, hypervisor-based protection for kernel code and data structures. H-KPP prevents the execution of unauthorized code in kernel mode. In addition, H-KPP protects certain object fields from malicious modifications.
Michael Kiperberg +1 more
doaj +1 more source
Improvement of computational abilities in computing environments with virtualization technologies [PDF]
In this paper, we illustrates the ways to improve abilities of the computing environments by using virtualization, single system image (SSI) and hypervisor technologies collaboration for goal to improve computational abilities.
A. V. Bogdanov, K. Zaya, K. Ko P. Sone
doaj +1 more source
Research of a Virtual Infrastructure Network with Hybrid Software-Defined Switching
Modern trends in the information technology have led to the fact that entire systems of infrastructure are becoming software-defined. Modern hyper-converged solutions use software-defined networking and soft switches for the hypervisor networking ...
Yuri Ushakov +2 more
doaj +1 more source
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus +6 more
core +1 more source
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source

