Who watches the watcher? Detecting hypervisor introspection from unprivileged guests

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware assisted hypervisor introspection

In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors. Similar to virtual machine introspection which has been proposed to protect virtual machines in an out-of-box way over the past decade, hypervisor introspection can be used to protect hypervisors which are the basis of cloud security. Virtual machine introspection tools are usually d...

متن کامل

Who Watches the Watchers

The rise in the use of electronic health records (EHRs) and associated resources over the last decade is leading to the end of the paper medical record and all the risks associated with the use of a paper chart. However, there has not been a concomitant creation of a systematic oversight body that is specifically charged with ensuring the public’s safety through the use of EHR knowledge resourc...

متن کامل

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring

Security requirements in the cloud have led to the development of new monitoring techniques that can be broadly categorized as virtual machine introspection (VMI) techniques. VMI monitoring aims to provide high-fidelity monitoring while keeping the monitor secure by leveraging the isolation provided by virtualization. This work shows that not all hypervisor activity is hidden from the guest vir...

متن کامل

The NIC Is the Hypervisor: Bare-Metal Guests in IaaS Clouds

Cloud computing does not inherently require the use of virtual machines, and some cloud customers prefer or even require “bare metal” systems, where no hypervisor separates the guest operating system from the CPU. Even for bare-metal nodes, the cloud provider must find a means to isolate the guest system from other cloud resources, and to manage the instantiation and removal of guests. We argue...

متن کامل

Who watches the watchers: Validating the ProB Validation Tool

Over the years, PROB has moved from a tool that complemented proving, to a development environment that is now sometimes used instead of proving for applications, such as exhaustive model checking or data validation. This has led to much more stringent requirements on the integrity of PROB. In this paper we present a summary of our validation efforts for PROB, in particular within the context o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Investigation

سال: 2018

ISSN: 1742-2876

DOI: 10.1016/j.diin.2018.04.015