AbstractThe file system becomes the usual target of malicious attacks because it contains lots of sensitive data, such as executable programs, configuration and authorization information. File integrity monitoring is an effective approach to discover aggressive behavior by detecting modification actions on these sensitive files. Traditional real-time integrity monitoring tools, which insert hooks into the OS kernel, are easily controlled and disabled by malicious software. Such existing methods, which insert kernel module into OS, are hard to be compatible because of the diversity of OS. In this paper, we present a non-intrusive real-time file integrity monitoring method in virtual machine-based computing environment, which is transparent t...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Integrity of operating system components must be carefully handled in order to optimize the system s...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
It can be critical if an intruder gains access to an operating system and modify file...
[EN] In this new era of technology and interconnected systems, the number of devices connected to th...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Security or system management software is essential for keeping systems secure. To deter attacks on ...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
When an operating system (OS) runs on a virtual machine (VM), a hypervisor, the software that facili...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Integrity of operating system components must be carefully handled in order to optimize the system s...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
There are several ways for an intruder to obtain access to a remote computing system, such as explo...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
It can be critical if an intruder gains access to an operating system and modify file...
[EN] In this new era of technology and interconnected systems, the number of devices connected to th...
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized ...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Security or system management software is essential for keeping systems secure. To deter attacks on ...
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...