Results 131 to 140 of about 17,865 (172)
Some of the next articles are maybe not open access.

Retrofitting LBR Profiling to Enhance Virtual Machine Introspection

IEEE Transactions on Information Forensics and Security, 2022
Weijie Liu   +5 more
openaire   +3 more sources

Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

Lecture Notes in Computer Science, 2013
We present a scalable honeynet system built on Xen using virtual machine introspection and cloning techniques to efficiently and effectively detect intrusions and extract associated malware binaries. By melding forensics tools with live memory introspection, the system is resistant to prior in-guest detection techniques of the monitoring environment ...
Tamas K. Lengyel   +3 more
openaire   +3 more sources

Virtual Machine Introspection in Virtualization: A Security Perspective

2021 Thirteenth International Conference on Contemporary Computing (IC3-2021), 2021
Virtualization technology has gained enough attention in several fields such as Cloud Computing, the Internet of Things (IoT), and software defined networking (SDN), etc. However, security issues in virtualization impose several questions on the adoption of this technology and raise strong security concerns.
Divya Kapil, Preeti Mishra
openaire   +1 more source

Efficient Checkpointing of Virtual Machines Using Virtual Machine Introspection

2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2014
Cloud Computing environments rely heavily on system-level virtualization. This is due to the inherent benefits of virtualization including fault tolerance through checkpoint/restart (C/R) mechanisms. Because clouds are the abstraction of large datacenters and large datacenters have a higher potential for failure, it is imperative that a C/R mechanism ...
Ferrol Aderholdt   +3 more
openaire   +1 more source

Virtual Machine Introspection Based SSH Honeypot

Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks.
Stewart Sentanoe   +2 more
openaire   +1 more source

Virtual Machine Introspection: Techniques and Applications

2015 10th International Conference on Availability, Reliability and Security, 2015
Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines at the hypervisor layer. This monitoring concept has gained recently a considerable focus in computer security research due to its complete but semantic less visibility on virtual machines activities and isolation from them.
Hebbal, Yacine   +2 more
openaire   +2 more sources

VICI Virtual Machine Introspection for Cognitive Immunity

2008 Annual Computer Security Applications Conference (ACSAC), 2008
When systems are under constant attack, there is no time to restore those infected with malware to health manually--repair of infected systems must be fully automated and must occur within milliseconds. After detecting kernel-modifying rootkit infections using Virtual Machine Introspection, the VICI Agent applies a collection of novel repair techniques
Timothy Fraser   +2 more
openaire   +1 more source

Virtual Machine Introspection based Cloud Monitoring Platform

Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
Virtual Machine Introspection (VMI) is an emerging family of techniques for extracting data from virtual machines without the use of active monitoring probes within the target machines themselves. In VMI based systems, the data is collected at the hypervisor-level by analyzing the state of virtual machines.
Lauren Samuel, Leppänen Ville
openaire   +2 more sources

Insider Threat Detection Using Virtual Machine Introspection

2013 46th Hawaii International Conference on System Sciences, 2013
This paper presents a methodology for signaling potentially malicious insider behavior using virtual machine introspection (VMI). VMI provides a novel means to detect potential malicious insiders because the introspection tools remain transparent and inaccessible to the guest and are extremely difficult to subvert.
Martin Crawford, Gilbert Peterson
openaire   +1 more source

Virtual Machine Introspection for Anomaly-Based Keylogger Detection

2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR), 2020
Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user.
Huseyn Huseynov   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy