Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtualisation control program QEMU-KVM. The vulnerability originally stems from improper hotplugging of emulated embedded circuitry in the Intel PIIX4 southbridge resulting in memory corruption and dangling pointers. The exploit can be used to compromise the availability of the virtual machine, or to escalate privileges compromising the confidentiality of the resources in the host system. The research presented in this dissertation shows that the discretionary access control system, provided by default in most Linux operating systems, is insufficient in protecting the QEMU-KVM hypervisor against the Virtunoid exploit. Further, the research presented...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicio...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches ...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Cloud computing is the most important technology at the present time, in terms of reducing applicati...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
As a new type of service computing model, cloud computing provides various services through the Inte...
With the rapid development of Internet, the traditional computing environment is making a big migrat...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
The paper presents a systematic review of risk assessment processes to provide an overview of the ri...
This disclosure describes techniques that leverage memory organization in virtual machines and their...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
At present, any computer equipment connected to the Internet is exposed to various threats, and the ...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicio...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
Virtualization has become a target for attacks in cloud computing environments. Existing approaches ...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Cloud computing is the most important technology at the present time, in terms of reducing applicati...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
As a new type of service computing model, cloud computing provides various services through the Inte...
With the rapid development of Internet, the traditional computing environment is making a big migrat...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
The paper presents a systematic review of risk assessment processes to provide an overview of the ri...
This disclosure describes techniques that leverage memory organization in virtual machines and their...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
At present, any computer equipment connected to the Internet is exposed to various threats, and the ...
Covert channels have been known for a long time because of their versatile forms of appearance. For ...
In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicio...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...