With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has become more important. Insight into hypervisor activity could allow normal users to identify suspicious behavior and benchmark performance. On the other hand, malicious users can use this information to craft a more advanced transient attack that would be undetectable to VM passive monitoring systems. This thesis introduces a novel side-channel to extract timing information from hypervisor-level monitoring systems, such as Virtual Machine Introspection (VMI) based monitoring. This information can be used to launch more sophisticated attacks, such as transient attacks, against hypervisor-level monitoring systems. It is often assumed that hyp...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
Hypervisor detection is a pillar of sandbox evasion techniques. While hardware-assisted virtualizati...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit fo...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtual Machine Introspection (VMI) monitors have to constantly interrupt theirtarget VMs, whether i...
Abstract—This paper presents StopWatch, a system that defends against timing-based side-channel atta...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
Hypervisor detection is a pillar of sandbox evasion techniques. While hardware-assisted virtualizati...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit fo...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtual Machine Introspection (VMI) monitors have to constantly interrupt theirtarget VMs, whether i...
Abstract—This paper presents StopWatch, a system that defends against timing-based side-channel atta...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...