In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit for the modern virtualized cloud, and describe two alternative out-of-band solutions that leverage virtualization for better systems monitoring. My first solution employs Virtual Machine Introspection (VMI) to gain access to a VM's runtime state from the virtualization layer. I develop new VMI techniques to efficiently expose VM memory state from outside the VM boundary, which can be readily employed in existing cloud platforms as they are designed to operate with no new modifications or dependencies. While there exist a variety of other competing alternatives, their latency, overhead, complexity and consistency trade-offs are not clear. Thus...
This is the online appendix of the paper Alessandro Tundo, Marco Mobilio, Oliviero Riganelli and Leo...
Abstract—Virtual machine introspection (VMI) is a mecha-nism that allows indirect inspection and man...
introduced in the 1960s to enable time-sharing of expensive hardware. In spite of rapidly falling ha...
In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit fo...
Cloud infrastructure commonly relies on virtualization. Customers provide their own VMs, and the clo...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Cloud computing is attractive for both consumers and providers to benefit from potential economies o...
Virtualization is one of the hottest research topics nowadays. Several academic researchers and deve...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
Benefits have been claimed by adopting virtualization techniques in many fields. It could significan...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
With the growth of virtualization and cloud computing, more and more forensic investigations rely on...
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) ...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
This is the online appendix of the paper Alessandro Tundo, Marco Mobilio, Oliviero Riganelli and Leo...
Abstract—Virtual machine introspection (VMI) is a mecha-nism that allows indirect inspection and man...
introduced in the 1960s to enable time-sharing of expensive hardware. In spite of rapidly falling ha...
In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit fo...
Cloud infrastructure commonly relies on virtualization. Customers provide their own VMs, and the clo...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Cloud computing is attractive for both consumers and providers to benefit from potential economies o...
Virtualization is one of the hottest research topics nowadays. Several academic researchers and deve...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Currently, cloud computing technology is implemented by many industries in the world. This technolog...
Benefits have been claimed by adopting virtualization techniques in many fields. It could significan...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
With the growth of virtualization and cloud computing, more and more forensic investigations rely on...
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) ...
While one always works to prevent attacks and failures, they are inevitable and situational awarenes...
This is the online appendix of the paper Alessandro Tundo, Marco Mobilio, Oliviero Riganelli and Leo...
Abstract—Virtual machine introspection (VMI) is a mecha-nism that allows indirect inspection and man...
introduced in the 1960s to enable time-sharing of expensive hardware. In spite of rapidly falling ha...