Malware often attempts to steal input and output through human interface devices to obtain confidential information. We propose to use a thin hypervisor, called “HyperIO”, to realize a secure path between input and output devices using a partial implementation of device drivers. We apply our approach using two security systems built on HyperIO: FireSafe and ClipCrypt. FireSafe is a web browser extension which allows a remote web server to display and receive sensitive user information securely. ClipCrypt enables the user to securely enter and view their confidential information in commodity Windows applications.peerReviewe
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
cs.kuleuven.be Abstract The sustained popularity of the cloud and cloud-related services accelerate ...
Abstract. Most commodity peripheral devices and their drivers are geared to achieve high performance...
Part 3: System SecurityInternational audienceThe sustained popularity of the cloud and cloud-related...
As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimple...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract. Personal computers lack of a security foothold to allow the end-users to protect their sys...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
As malware continue to evolve, so do the countermeasures which attempt to fight them. A modern comp...
The sustained popularity of the cloud and cloud-related services accelerate the evolution of virtual...
cs.kuleuven.be Abstract The sustained popularity of the cloud and cloud-related services accelerate ...
Abstract. Most commodity peripheral devices and their drivers are geared to achieve high performance...
Part 3: System SecurityInternational audienceThe sustained popularity of the cloud and cloud-related...
As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimple...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing vari...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...
Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectivel...