The current TCG architecture suffers from the Time-of-Check-To-Time-of-Use (TOCTOU) attacks in commodity PC operating systems (OS), in which kernel rootkits can get unrestricted access to OS resources. VMM-based approaches running at a privilege level higher than that of virtual machine (VM) kernel can effectively detect dynamic or static data attacks occurring in VMs. This paper proposes a lightweight response mechanism (LWRM) for TCG TOCTOU attacks occurring in VMs. LWRM has the following features: (1) compared to the existing response mechanism, LWRM is more effective in defeating the TCG TOCTOU attacks; (2) LWRM imposes less overhead on the system during normal execution; (3) LWRM is transparent to the kernel rootkits; and (4) LWRM can ...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG ar...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
The traditional physical power grid is evolving into a cyber-physical Smart Grid (SG) that links the...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
As a new type of service computing model, cloud computing provides various services through the Inte...
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of t...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Software-defined networking (SDN) has received considerable attention and adoption owing to its inhe...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG ar...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and in...
The traditional physical power grid is evolving into a cyber-physical Smart Grid (SG) that links the...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
As a new type of service computing model, cloud computing provides various services through the Inte...
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of t...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Software-defined networking (SDN) has received considerable attention and adoption owing to its inhe...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...