Part 4: Operating System and Firmware SecurityInternational audienceEffectively protecting the WindowsTM OS is a challenging task, since most implementation details are not publicly known. Windows OS has always been the main target of malware that have exploited numerous bugs and vulnerabilities exposed by its implementations. Recent trusted boot and additional integrity checks have rendered the Windows OS less vulnerable to kernel-level rootkits. Nevertheless, guest Windows Virtual Machines are becoming an increasingly interesting attack target. In this work we introduce and analyze a novel Hypervisor-Based Introspection System (HyBIS) we developed for protecting Windows OSes from malware and rootkits. The HyBIS architecture is motivated a...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) ...
This thesis examines techniques to automate configuration of an intrusion de-tection system utilizin...
Part 4: Operating System and Firmware SecurityInternational audienceEffectively protecting the Windo...
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Win...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
Microsoft windows is a family of client and server operating systems that needs no introduction. Mic...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
eingereicht und durch die Fakultät für Informatik am 26.08.2013 angenommen. System virtualization ...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
Over the last few years there has been immense progress in developing powerful security tools based ...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
Nowadays, cloud computing is gaining more and more popularity. People use cloud-related services eve...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) ...
This thesis examines techniques to automate configuration of an intrusion de-tection system utilizin...
Part 4: Operating System and Firmware SecurityInternational audienceEffectively protecting the Windo...
Recent years have seen an uptick in master boot record (MBR) based rootkits that load before the Win...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
Microsoft windows is a family of client and server operating systems that needs no introduction. Mic...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
eingereicht und durch die Fakultät für Informatik am 26.08.2013 angenommen. System virtualization ...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
Over the last few years there has been immense progress in developing powerful security tools based ...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assi...
Nowadays, cloud computing is gaining more and more popularity. People use cloud-related services eve...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) ...
This thesis examines techniques to automate configuration of an intrusion de-tection system utilizin...