VMI-PL: A monitoring language for virtual platforms using virtual machine introspection
With the growth of virtualization and cloud computing, more and more forensic investigations rely on being able to perform live forensics on a virtual machine using virtual machine introspection (VMI). Inspecting a virtual machine through its hypervisor enables investigation without risking contamination of the evidence, crashing the computer, etc.
Westphal, Florian +3 more
openaire +5 more sources
Towards virtual machine introspection based security framework for cloud
Virtualization enables provision of resources to users according to their requirement through Infrastructure as a Service (IaaS) delivery model in cloud computing environment. Malicious users could lease cloud resources and use them as platforms to launch attacks.
Bhavesh Borisaniya, Dhiren Patel
openaire +4 more sources
copick: An open dataset interface and toolkit for collaborative annotation and analysis of cryo-electron tomography data. [PDF]
Abstract Cryo‐electron tomography (cryoET) enables visualization of macromolecular complexes within intact cellular environments. Continued improvements in instrumentation, sample preparation, and data‐processing pipelines have increased both the scale and the complexity of cryoET datasets, making manual analysis challenging.
Ermel UH +9 more
europepmc +2 more sources
Access Improvement in Healthcare: Be Quick, but Don't Hurry? [PDF]
ABSTRACT Background Access improvement is a fundamental component of value‐based healthcare as it inherently promotes quality by eliminating chokepoints, redundancies, and inefficiencies that could hinder the provisioning of timely care. Yet as healthcare organizations struggle with cost containment, the question of how to most effectively enhance ...
Chen AM.
europepmc +2 more sources
From the Field to the Laboratory: The Theory‐Practice Research of Peter J. Carnevale
Abstract As colleagues and collaborators, we reflect on the work and legacy of Peter Carnevale, currently professor at the University of Southern California, and recipient of the 2002 Jeffrey Z. Rubin Theory‐to‐Practice Award of the International Association for Conflict Management (IACM). We review Carnevale’s main contributions, including his work on
Linda L. Putnam +3 more
wiley +1 more source
Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection [PDF]
Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel virtualization security solution which aims to provide comprehensive protection of the ...
Win, Thu Yein +2 more
openaire +2 more sources
Automatically bridging the semantic gap in machine introspection [PDF]
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core +1 more source
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source
Cognitive Science and Psychology [PDF]
The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind.
Chow, Dr Siu L.
core +1 more source
Virtualization security:the good,the bad and the ugly
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU,Hai-bo CHEN
doaj +3 more sources

