Results 131 to 140 of about 17,865 (172)
Some of the next articles are maybe not open access.
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection
IEEE Transactions on Information Forensics and Security, 2022Weijie Liu +5 more
openaire +3 more sources
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
Lecture Notes in Computer Science, 2013We present a scalable honeynet system built on Xen using virtual machine introspection and cloning techniques to efficiently and effectively detect intrusions and extract associated malware binaries. By melding forensics tools with live memory introspection, the system is resistant to prior in-guest detection techniques of the monitoring environment ...
Tamas K. Lengyel +3 more
openaire +3 more sources
Virtual Machine Introspection in Virtualization: A Security Perspective
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021), 2021Virtualization technology has gained enough attention in several fields such as Cloud Computing, the Internet of Things (IoT), and software defined networking (SDN), etc. However, security issues in virtualization impose several questions on the adoption of this technology and raise strong security concerns.
Divya Kapil, Preeti Mishra
openaire +1 more source
Efficient Checkpointing of Virtual Machines Using Virtual Machine Introspection
2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2014Cloud Computing environments rely heavily on system-level virtualization. This is due to the inherent benefits of virtualization including fault tolerance through checkpoint/restart (C/R) mechanisms. Because clouds are the abstraction of large datacenters and large datacenters have a higher potential for failure, it is imperative that a C/R mechanism ...
Ferrol Aderholdt +3 more
openaire +1 more source
Virtual Machine Introspection Based SSH Honeypot
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks.
Stewart Sentanoe +2 more
openaire +1 more source
Virtual Machine Introspection: Techniques and Applications
2015 10th International Conference on Availability, Reliability and Security, 2015Virtual Machine Introspection (VMI) is a technique that enables monitoring virtual machines at the hypervisor layer. This monitoring concept has gained recently a considerable focus in computer security research due to its complete but semantic less visibility on virtual machines activities and isolation from them.
Hebbal, Yacine +2 more
openaire +2 more sources
VICI Virtual Machine Introspection for Cognitive Immunity
2008 Annual Computer Security Applications Conference (ACSAC), 2008When systems are under constant attack, there is no time to restore those infected with malware to health manually--repair of infected systems must be fully automated and must occur within milliseconds. After detecting kernel-modifying rootkit infections using Virtual Machine Introspection, the VICI Agent applies a collection of novel repair techniques
Timothy Fraser +2 more
openaire +1 more source
Virtual Machine Introspection based Cloud Monitoring Platform
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018Virtual Machine Introspection (VMI) is an emerging family of techniques for extracting data from virtual machines without the use of active monitoring probes within the target machines themselves. In VMI based systems, the data is collected at the hypervisor-level by analyzing the state of virtual machines.
Lauren Samuel, Leppänen Ville
openaire +2 more sources
Insider Threat Detection Using Virtual Machine Introspection
2013 46th Hawaii International Conference on System Sciences, 2013This paper presents a methodology for signaling potentially malicious insider behavior using virtual machine introspection (VMI). VMI provides a novel means to detect potential malicious insiders because the introspection tools remain transparent and inaccessible to the guest and are extremely difficult to subvert.
Martin Crawford, Gilbert Peterson
openaire +1 more source
Virtual Machine Introspection for Anomaly-Based Keylogger Detection
2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR), 2020Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user.
Huseyn Huseynov +3 more
openaire +1 more source

