Security systems can provide secure and efficient in-VM monitoring. An exemplary security system can be built upon hardware virtualization features and can comprise a virtual machine having a plurality of standard virtual address spaces, as well as a hidden virtual address space. While the standard virtual address spaces can be directly accessible by a kernel in the virtual machine, the hidden virtual address space can be hidden from the kernel, which can be absent a virtual page table corresponding to the hidden virtual address space. A security monitor can reside in the hidden address space, monitoring the kernel without being modifiable by the kernel. A processor can transfer focus from the standard virtual address spaces to the hidden v...
A confidential virtual machine (CVM) uses a hardware-rooted key to encrypt customer data written to ...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX ...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
The paper presents the results of research of the method that increases the information processing s...
Over the last few years there has been immense progress in developing powerful security tools based ...
Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastru...
We propose security architecture based on virtual machine monitor to efficiently deal with attacks o...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
This disclosure describes techniques that leverage memory organization in virtual machines and their...
A confidential virtual machine (CVM) uses a hardware-rooted key to encrypt customer data written to ...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX ...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
The paper presents the results of research of the method that increases the information processing s...
Over the last few years there has been immense progress in developing powerful security tools based ...
Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastru...
We propose security architecture based on virtual machine monitor to efficiently deal with attacks o...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
This disclosure describes techniques that leverage memory organization in virtual machines and their...
A confidential virtual machine (CVM) uses a hardware-rooted key to encrypt customer data written to ...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...