Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers and data centers. Aside from server applications, hypervisors are also becoming a popular target for implementing many security systems, since they provide a small and easy-to-secure trusted computing base. This paper presents a novel way of using hypervisors to protect application data privacy even when the underlying operating system is not trustable. Each page in virtual address space is rendered to user applications ac-cording to the security context the application is running in. The hypervisor encrypts and decrypts each memory page requested de-pending on the application’s access permission to the page. The main result of this system is t...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
A hypervisor is a software which virtualizes hardware resources, allowing several guest operating sy...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Win...
We present the sHype hypervisor security architecture and examine in detail its mandatory access con...
Abstract—In this paper we present a virtualization-based approach of protecting execution of trusted...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
A hypervisor is a software which virtualizes hardware resources, allowing several guest operating sy...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Win...
We present the sHype hypervisor security architecture and examine in detail its mandatory access con...
Abstract—In this paper we present a virtualization-based approach of protecting execution of trusted...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
A hypervisor is a software which virtualizes hardware resources, allowing several guest operating sy...