Results 131 to 140 of about 17,798 (178)
Some of the next articles are maybe not open access.
Virtual Machine Introspection Based SSH Honeypot
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks.
Stewart Sentanoe +2 more
openaire +1 more source
Virtual Machine Introspection: Techniques and Applications
2015 10th International Conference on Availability, Reliability and Security, 2015Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines at the hypervisor layer. This monitoring concept has gained recently a considerable focus in computer security research due to its complete but semantic less visibility on virtual machines activities and isolation from them.
Hebbal, Yacine +2 more
openaire +2 more sources
VICI Virtual Machine Introspection for Cognitive Immunity
2008 Annual Computer Security Applications Conference (ACSAC), 2008When systems are under constant attack, there is no time to restore those infected with malware to health manually--repair of infected systems must be fully automated and must occur within milliseconds. After detecting kernel-modifying rootkit infections using Virtual Machine Introspection, the VICI Agent applies a collection of novel repair techniques
Timothy Fraser +2 more
openaire +1 more source
Virtual Machine Introspection based Cloud Monitoring Platform
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018Virtual Machine Introspection (VMI) is an emerging family of techniques for extracting data from virtual machines without the use of active monitoring probes within the target machines themselves. In VMI based systems, the data is collected at the hypervisor-level by analyzing the state of virtual machines.
Lauren Samuel, Leppänen Ville
openaire +2 more sources
Insider Threat Detection Using Virtual Machine Introspection
2013 46th Hawaii International Conference on System Sciences, 2013This paper presents a methodology for signaling potentially malicious insider behavior using virtual machine introspection (VMI). VMI provides a novel means to detect potential malicious insiders because the introspection tools remain transparent and inaccessible to the guest and are extremely difficult to subvert.
Martin Crawford, Gilbert Peterson
openaire +1 more source
Virtual Machine Introspection for Anomaly-Based Keylogger Detection
2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR), 2020Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user.
Huseyn Huseynov +3 more
openaire +1 more source
A lightweight method for virtual machine introspection
Programming and Computer Software, 2017A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers ...
N. I. Fursova +3 more
openaire +1 more source
A formal model for virtual machine introspection
Proceedings of the 1st ACM workshop on Virtual machine security, 2009Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. In this paper, we present a formal discussion of the development of VMI-based security applications. We begin by identifying three major challenges that all VMI-based security applications must overcome.
Jonas Pfoh +2 more
openaire +1 more source
Introspection of Virtual Machine Memory Resource in the Virtualized Systems
2019 IEEE International Conference on Big Data and Smart Computing (BigComp), 2019Nowadays, data center and cloud servers have commonly adopted virtualization technologies to consolidate multiple servers into a physical one. It is because cloud service providers can achieve low server maintenance cost by improving resource utilization and reducing power consumption through server consolidation with virtualization technologies ...
Minho Lee +3 more
openaire +1 more source
Lightweight Non-intrusive Virtual Machine Introspection
2018Dynamic analysis is an important technology for different phases of the software life cycle. Dynamic analysis is used for profiling, malware analysis, intrusion detection, protocol reverse engineering, software testing, and many other activities. This paper presents a lightweight approach for monitoring of systems using virtual machines.
Natalia Fursova +3 more
openaire +1 more source

