This dissertation describes monitoring methods to achieve both security and reliability in virtualized computer systems. Our key contribution is showing how we can perform continuous monitoring and leverage information across different layers of a virtualized computer system to detect malicious attacks and accidental failures. For monitoring software running inside a virtual ma- chine, we introduce HyperTap and Hprobes, which are out-of-VM monitoring frameworks that facilitate detection of security and reliability incidents oc- curring inside a VM. For monitoring the hypervisor, we introduce hShield, a Control-Flow Integrity (CFI) enforcement method to detect VM-escape at- tacks. HyperTap, Hprobes, and hShield create a complete chain-of-tru...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
Virtualization is the predominant enabling technology of current cloud infrastructures and brings un...