Over the past few years, virtualization has been em-ployed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security researchers embraced virtual machine monitors (VMMs) as a new mechanism to guarantee deep isola-tion of untrusted software components. Unfortunately, their widespread adoption promoted VMMs as a prime target for attackers. In this paper, we present Hyper-Check, a hardware-assisted tampering detection frame-work designed to protect the integrity of VMMs and, for some classes of attacks, the underlying operating system (OS). HyperCheck leverages the CPU System Managed Mode (SMM), present in x86 systems, to securely gen-erate and transmit the full state of the protected machine t...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Abstract—System integrity monitors, such as rootkit detectors, rely critically on the ability to fet...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Abstract—System integrity monitors, such as rootkit detectors, rely critically on the ability to fet...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodi...