AbstractThe file system becomes the usual target of malicious attacks because it contains lots of sensitive data, such as executable programs, configuration and authorization information. File integrity monitoring is an effective approach to discover aggressive behavior by detecting modification actions on these sensitive files. Traditional real-time integrity monitoring tools, which insert hooks into the OS kernel, are easily controlled and disabled by malicious software. Such existing methods, which insert kernel module into OS, are hard to be compatible because of the diversity of OS. In this paper, we present a non-intrusive real-time file integrity monitoring method in virtual machine-based computing environment, which is transparent t...
File is a component of a computer system that has importance value of its own, either in terms of av...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
This paper discusses the design of the Virtualization Integrity Measurement Monitor (VIMM) framework...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Integrity of operating system components must be carefully handled in order to optimize the system s...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
It can be critical if an intruder gains access to an operating system and modify file...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
The purpose of this paper is to identify and contend with the threat of program modification attacks...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
In typical file systems, valuable data is vulnerable to being accidentally or maliciously deleted or...
File is a component of a computer system that has importance value of its own, either in terms of av...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
This paper discusses the design of the Virtualization Integrity Measurement Monitor (VIMM) framework...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Integrity of operating system components must be carefully handled in order to optimize the system s...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
It can be critical if an intruder gains access to an operating system and modify file...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
The purpose of this paper is to identify and contend with the threat of program modification attacks...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
In typical file systems, valuable data is vulnerable to being accidentally or maliciously deleted or...
File is a component of a computer system that has importance value of its own, either in terms of av...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
This paper discusses the design of the Virtualization Integrity Measurement Monitor (VIMM) framework...