Nowadays cloud computing technology is used for a variety of services, such as the internet of things and artificial intelligence. However, as more data is being processed in the cloud, there is growing concern about security issues in the cloud computing environment. To solve this concern, many studies have been conducted to ensure the integrity of virtual machines in a cloud computing environment. However, in the case of the control-flow integrity for the virtual machine, existing studies are not only necessary to modify the kernel code, but also cannot protect it efficiently. In this paper, we propose VM-CFI which efficiently protects the control-flow integrity of VM kernel without modification of VM kernel in cloud computing environment...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the ...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Abstract—Emerging distributed computing architectures, such as grid and cloud computing, depend on t...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Abstract—The traditional virtual machine usage model advo-cates placing security mechanisms in a tru...
ABSTRACT: Cloud computing offers to the end user the ability of accessing a pool of resources with t...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Cloud computing is a trend in outsourcing and remote processing of applications built on research in...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the ...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Abstract—Emerging distributed computing architectures, such as grid and cloud computing, depend on t...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Abstract—The traditional virtual machine usage model advo-cates placing security mechanisms in a tru...
ABSTRACT: Cloud computing offers to the end user the ability of accessing a pool of resources with t...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Cloud computing is a trend in outsourcing and remote processing of applications built on research in...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the ...