Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual machine monitors
biblio
Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
encryption
Hardware
Memory management
pubcrawl
Science of Security
Virtual machine monitors
Virtualization
biblio
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
dynamic analysis approach
virtual machine
virtual machines
machine-learning-based approaches
file system
Virtual machine monitors
cloud nodes
deep learning technology
deep-learning-based memory analysis
Predictive Metrics
malicious binary files
malware execution
Memory Analysis
memory analysis approach
real-world malwares
run-time overhead
zero-day malware
Monitoring
Gray-scale
Malware Analysis
Virtual machining
privacy
Metrics
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
invasive software
malware detection
malware
Cloud Computing
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
Virtual machine monitors
policy governance
clean slate
Unikernels
unikernel technologies
software-defined systems
software defined systems
software defined cloud computing
lightweight virtualization technologies
lightweight virtualization approaches
legacy unikernels
hardware infrastructure
Docker LinuxKit
Docker Containers
cloud infrastructure components
big monolithic applications
Cloud Computing
operating systems
virtual machines
operating systems (computers)
Virtualization
cloud
performance evaluation
Containers
software libraries
Metrics
pubcrawl
Human behavior
Resiliency
Kernel
virtualisation
Servers
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
Powering Hands-on Cybersecurity Practices with Cloud Computing
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
Metrics
web services
virtualisation
Virtual machine monitors
tools
specific virtual computing service provider
security of data
Science of Security
Scalability
Resiliency
resilience
pubcrawl
private OpenStack cloud
powering hands-on cybersecurity practices
Policy-Governed Secure Collaboration
multiple clouds
Chameleon cloud
Human behavior
hands-on lab
hands-on cybersecurity practice
educational courses
education
cybersecurity education
computer security
computer science education
composability
Communication networks
collaboration
cloud-based platform named EZSetup
cloud-agnostic
Cloud Computing
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
Threats Against the Virtual Machine Environment of NFV
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
privilege escalation
VM escape threats
Virtualization
virtualisation
architectural modeling
Cloud Computing
computer architecture
computer network security
Hardware
misuse patterns
network function virtualization
NFV
on-demand network functions
Virtual machining
pubcrawl
security
security reference architecture
security threats
Software
UML diagrams
Unified modeling language
virtual machine environment
Virtual machine monitors
virtual machine security
virtual machines
biblio
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
pubcrawl
virtualisation
virtual-machine-introspection-based security monitors
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
tools
system monitoring
storage management
Semantics
security of data
security
Cloud Computing
page-level monitoring
page-level monitor
page-level memory monitor
out-of-virtual-machine security tools
operating system kernels
Monitoring
monitor target kernel objects
memory pages
memory page
low-overhead kernel object monitoring
kernel object modification monitoring
Kernel
dentry object monitoring
« first
‹ previous
1
2
3
4
5
6
next ›
last »