Results 131 to 140 of about 17,798 (178)
Some of the next articles are maybe not open access.

Virtual Machine Introspection Based SSH Honeypot

Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks.
Stewart Sentanoe   +2 more
openaire   +1 more source

Virtual Machine Introspection: Techniques and Applications

2015 10th International Conference on Availability, Reliability and Security, 2015
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines at the hypervisor layer. This monitoring concept has gained recently a considerable focus in computer security research due to its complete but semantic less visibility on virtual machines activities and isolation from them.
Hebbal, Yacine   +2 more
openaire   +2 more sources

VICI Virtual Machine Introspection for Cognitive Immunity

2008 Annual Computer Security Applications Conference (ACSAC), 2008
When systems are under constant attack, there is no time to restore those infected with malware to health manually--repair of infected systems must be fully automated and must occur within milliseconds. After detecting kernel-modifying rootkit infections using Virtual Machine Introspection, the VICI Agent applies a collection of novel repair techniques
Timothy Fraser   +2 more
openaire   +1 more source

Virtual Machine Introspection based Cloud Monitoring Platform

Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
Virtual Machine Introspection (VMI) is an emerging family of techniques for extracting data from virtual machines without the use of active monitoring probes within the target machines themselves. In VMI based systems, the data is collected at the hypervisor-level by analyzing the state of virtual machines.
Lauren Samuel, Leppänen Ville
openaire   +2 more sources

Insider Threat Detection Using Virtual Machine Introspection

2013 46th Hawaii International Conference on System Sciences, 2013
This paper presents a methodology for signaling potentially malicious insider behavior using virtual machine introspection (VMI). VMI provides a novel means to detect potential malicious insiders because the introspection tools remain transparent and inaccessible to the guest and are extremely difficult to subvert.
Martin Crawford, Gilbert Peterson
openaire   +1 more source

Virtual Machine Introspection for Anomaly-Based Keylogger Detection

2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR), 2020
Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user.
Huseyn Huseynov   +3 more
openaire   +1 more source

A lightweight method for virtual machine introspection

Programming and Computer Software, 2017
A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers ...
N. I. Fursova   +3 more
openaire   +1 more source

A formal model for virtual machine introspection

Proceedings of the 1st ACM workshop on Virtual machine security, 2009
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. In this paper, we present a formal discussion of the development of VMI-based security applications. We begin by identifying three major challenges that all VMI-based security applications must overcome.
Jonas Pfoh   +2 more
openaire   +1 more source

Introspection of Virtual Machine Memory Resource in the Virtualized Systems

2019 IEEE International Conference on Big Data and Smart Computing (BigComp), 2019
Nowadays, data center and cloud servers have commonly adopted virtualization technologies to consolidate multiple servers into a physical one. It is because cloud service providers can achieve low server maintenance cost by improving resource utilization and reducing power consumption through server consolidation with virtualization technologies ...
Minho Lee   +3 more
openaire   +1 more source

Lightweight Non-intrusive Virtual Machine Introspection

2018
Dynamic analysis is an important technology for different phases of the software life cycle. Dynamic analysis is used for profiling, malware analysis, intrusion detection, protocol reverse engineering, software testing, and many other activities. This paper presents a lightweight approach for monitoring of systems using virtual machines.
Natalia Fursova   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy