Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer which offers thanks to its location a strong visibility on their activities in addition to a strong isolation from them. However, hypervisor view of VMs is just raw bits and bytes in addition to hardware states. The semantic difference between this raw view and the one needed for VM security monitoring presents a significant challenge for VMI called “the semantic gap”. In order to obtain semantic information about VM states and activities for monitoring their security from the hypervisor layer, we present in this thesis a set of techniques based on analysis and reuse of VM kernel binary code. These techniques enable to identify addresses and nam...
In a virtualized environment, the hypervisor provides isolation at the software level, but shared in...
Abstract—It is generally believed to be a tedious, time-consuming, and error-prone process to develo...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
International audienceVirtual Machine Introspection (VMI) techniques generally employ kernel symbols...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
eingereicht und durch die Fakultät für Informatik am 26.08.2013 angenommen. System virtualization ...
The insecurity of modern-day software has created the need for security monitoring applications. Tw...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
All systems that utilize virtual machine introspection (VMI) need to overcome the disconnect between...
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Abstract—A prerequisite to implementing virtualization-aware security solutions is to solve the “sem...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
In a virtualized environment, the hypervisor provides isolation at the software level, but shared in...
Abstract—It is generally believed to be a tedious, time-consuming, and error-prone process to develo...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
International audienceVirtual Machine Introspection (VMI) techniques generally employ kernel symbols...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
eingereicht und durch die Fakultät für Informatik am 26.08.2013 angenommen. System virtualization ...
The insecurity of modern-day software has created the need for security monitoring applications. Tw...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
All systems that utilize virtual machine introspection (VMI) need to overcome the disconnect between...
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Abstract—A prerequisite to implementing virtualization-aware security solutions is to solve the “sem...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
In a virtualized environment, the hypervisor provides isolation at the software level, but shared in...
Abstract—It is generally believed to be a tedious, time-consuming, and error-prone process to develo...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...