Results 141 to 150 of about 17,865 (172)
Some of the next articles are maybe not open access.

A lightweight method for virtual machine introspection

Programming and Computer Software, 2017
A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers ...
N. I. Fursova   +3 more
openaire   +1 more source

A formal model for virtual machine introspection

Proceedings of the 1st ACM workshop on Virtual machine security, 2009
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. In this paper, we present a formal discussion of the development of VMI-based security applications. We begin by identifying three major challenges that all VMI-based security applications must overcome.
Jonas Pfoh   +2 more
openaire   +1 more source

Introspection of Virtual Machine Memory Resource in the Virtualized Systems

2019 IEEE International Conference on Big Data and Smart Computing (BigComp), 2019
Nowadays, data center and cloud servers have commonly adopted virtualization technologies to consolidate multiple servers into a physical one. It is because cloud service providers can achieve low server maintenance cost by improving resource utilization and reducing power consumption through server consolidation with virtualization technologies ...
Minho Lee   +3 more
openaire   +1 more source

Lightweight Non-intrusive Virtual Machine Introspection

2018
Dynamic analysis is an important technology for different phases of the software life cycle. Dynamic analysis is used for profiling, malware analysis, intrusion detection, protocol reverse engineering, software testing, and many other activities. This paper presents a lightweight approach for monitoring of systems using virtual machines.
Natalia Fursova   +3 more
openaire   +1 more source

VE-VMI: High-Performance Virtual Machine Introspection Based on Virtualization Exception

2021 20th International Symposium on Parallel and Distributed Computing (ISPDC), 2021
Virtual machine introspection (VMI) mostly relies on memory virtualization mechanisms to enforce access restrictions on certain areas of the virtual machine (VM)’s physical memory, including the page tables managed by the guest OS. Consequently, the CPU will generate exceptions on any in-VM memory access not complying with the restrictions imposed by ...
Andrei Lutas   +3 more
openaire   +1 more source

CryptVMI: Encrypted Virtual Machine Introspection in the Cloud

2014 IEEE 7th International Conference on Cloud Computing, 2014
Virtualization techniques are the key in both public and private cloud computing environments. In such environments, multiple virtual instances are running on the same physical machine. The logical isolation between systems makes security assurance weaker than physically isolated systems.
Fangzhou Yao, Roy H. Campbell
openaire   +1 more source

A Universal Semantic Bridge for Virtual Machine Introspection

2011
All systems that utilize virtual machine introspection (VMI) need to overcome the disconnect between the low-level state that the hypervisor sees and its semantics within the guest. This problem has become well-known as the semanticgap. In this work, we introduce our tool, InSight, that establishes a semantic connection between the guest and the ...
Christian Schneider   +2 more
openaire   +1 more source

Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection

2010 43rd Hawaii International Conference on System Sciences, 2010
We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoint's operating system and do not protect the monitoring function from subversion or ...
Darrell Kienzle   +2 more
openaire   +1 more source

K-binID: Kernel binary code identification for Virtual Machine Introspection

2017 IEEE Conference on Dependable and Secure Computing, 2017
Virtual Machine Introspection (VMI) techniques generally employ kernel symbols to obtain addresses of kernel data and functions of interest to monitor guest OS states and activities. However, employing kernel symbols in an Infrastructure as a Service (IaaS) cloud presumes perfect knowledge of what kernel version and customization is running in an ...
Hebbal, Yacine   +2 more
openaire   +2 more sources

Evolution of digital forensics in virtualization by using virtual machine introspection

Proceedings of the 51st ACM Southeast Conference, 2013
Computer virtualization is not a new technology, it has become increasingly important because of the many advantages it offers to businesses and individuals to reduce costs, while introducing new challenges to the field of digital forensics. As virtualization continues to be adopted by more and more companies every year, malware and hacker attacks are ...
James Poore   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy