Malware Detection by Signature Matching in a Hypervisor
|
|
|
- Camilla Willis
- 9 years ago
- Views:
Transcription
1 Computer Security Symposium October 1 November [email protected] [email protected] BVMD MWS 2012 BVMD BitVisor BVMD OS Malware Detection by Signature Matching in a Hypervisor Yoshihiro Oyama Yudai Kawasaki The University of Electro-Communications Chofugaoka, Chofu-shi, Tokyo , JAPAN [email protected] [email protected] Abstract We report the result of experiments in which we detected malware in the MWS 2012 malware dataset by using BVMD, a hypervisor that provides a malware detection mechanism. BVMD is implemented by extending a parapass-through hypervisor BitVisor. BVMD applies signature matching against data blocks that are transmitted between the guest OS and devices such as hard disks. 1 OS OS PC OS Conficker [8] OS BVMD [6] BVMD VMM OS
2 guest OS device driver control I/O hypervisor data I/O parapass-through driver monitoring/ verification enforcing security hardware 1: BitVisor BVMD OS OS OS BVMD BitVisor [10] BitVisor BVMD OS 1 BVMD PC BVMD BVMD BVMD OS OS OS BVMD OS OS BitVisor BVMD OS 2012 (MWS2012) [5] BVMD BVMD OS BVMD 2 BitVisor BVMD BitVisor BVMD BitVisor BitVisor VMM OS VMM BitVisor Trusted Computing Base (TCB) BitVisor 1 hypervisor BitVisor BitVisor I/O I/O I/O OS
3 parapass-through driver data I/O signatures 52fd5f c c c c... 65f85b5ec9c e automaton generation module signature automaton matching module 2: I/O BitVisor parapass-through driver OS I/O I/O I/O I/O I/O I/O I/O BitVisor I/O I/O BitVisor VPN 2.2 BVMD BVMD OS BVMD BitVisor I/O 2 automaton generation module matching module Aho-Corasick [1] BVMD ClamAV [2] BVMD VMM BitVisor BVMD VMM BVMD [14] BVMD OS BVMD I/O I/O BVMD OS OS OS [6] OS Windows
4 main.hdb: d0e0c049ed7056eac8bb :162516:worm.kido-160 main.mdb: 12288:b0df5fa4a5e588c6e ca29c:Trojan.Agent main.db: Worm.Blaster.A (Clam)= e04edffffff746f c4f f55... main.ndb: Trojan.Dropper-18535:1:EP+0:807c f85c be dbe00c0ffff57 3: ClamAV Linux VMM BVMD BVMD OS OS VRAM VMM [13] OS 3 OS OS OS OS ClamAV ClamAV.hdb.mdb.db.ndb ClamAV 3 main.hdb main.mdb PE main.db main.ndb BVMD ClamAV.db.ndb
5 disk blocks malware signature combined blocks 4: BVMD BVMD.ndb BVMD 2.4 false positive false negative BVMD BVMD OS BVMD OS BVMD Linux ext3 Windows NTFS 3 BVMD MWS
6 1: computer Dell Optiplex 990 CPU chipset memory hard disk Intel Core i GHz Intel Q67 Express 16 GB Seagate ST AS VMM BitVisor 1.2 guest OS Ubuntu 12.04, Linux generic-pae BVMD OS ClamAV ClamAV ClamAV ClamAV Trojan.Crypt-106, Trojan.Downloader-59911, Trojan.Dropper , Trojan.Dropper-20380, Worm.Autorun Trojan.Downloader-59911, Trojan.Dropper-20380, Worm.Autorun UPX ClamAV UPX ClamAV 2 ClamAV ClamAV 114 Trojan. Crypt Trojan.Dropper BVMD BVMD OS BVMD VMwatcher [4] VM OS OS VMwatcher OS BVMD VMM BVMD OS OS OS OS VMM VMwatcher Zhang [12] Trend Micro Deep Security [11] Livewire [3] Lares [7] BitVisor BVMD TCB SecVisor [9] BitVisor BVMD VMM SecVisor OS integrity
7 OS 5 BitVisor BVMD MWS JSPS [1] Alfred V. Aho and Margaret J. Corasick. Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM, 18(6): , [2] Clam AntiVirus. net/. [3] Tal Garfinkel and Mendel Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, [4] Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. Stealthy Malware Detection and Monitoring through VMM- Based Out-of-the-Box Semantic View Reconstruction. ACM Transactions on Information and System Security, 13(2), [5] MWS2012. MWS 2012 Datasets. about.html#datasets. [6] Yoshihiro Oyama, Tran Truong Duc Giang, Yosuke Chubachi, Takahiro Shinagawa, and Kazuhiko Kato. Detecting Malware Signatures in a Thin Hypervisor. In Proceedings of the 27th ACM Symposium on Applied Computing, pages , [7] Bryan D. Payne, Martim Carbone, Monirul Sharif, and Wenke Lee. Lares: An Architecture for Secure Active Monitoring Using Virtualization. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages , [8] Phillip Porras, Hassen Saidi, and Vinod Yegneswaran. An Analysis of Conficker Logic and Rendezvous Points. Technical report, SRI International, http: //mtc.sri.com/conficker/. [9] Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of the 21st ACM Symposium on Operating Systems Principles, pages , [10] Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, and Kazuhiko Kato. BitVisor: A Thin Hypervisor for Enforcing I/O Device Security. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE 2009), pages ,
8 [11] Trend Micro. Deep Security. emea.trendmicro.com/emea/products/ enterprise/deep-security/. [12] Youhui Zhang, Yu Gu, Hongyi Wang, and Dongsheng Wang. Virtual-Machinebased Intrusion Detection on File-aware Block Level Storage. In Proceedings of the 18th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 06), pages , [13],. ADvisor: OS. OS, volume 2011-OS-118, [14],. VMM. OS, volume 2012-OS-122,
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
A Hypervisor-Based Bus System for Usage Control
A Hypervisor-Based Bus System for Usage Control Cornelius Moucha Fraunhofer IESE, Kaiserslautern, Germany Enrico Lovat, Alexander Pretschner Karlsruhe Institute of Technology, Germany Abstract Data usage
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud Bhavesh Borisaniya and Dr. Dhiren Patel NIT Surat,
Secure Out-of-band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds
Secure Out-of-band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds Kenichi Kourai Department of Creative Informatics Kyushu Institute of Technology Fukuoka, Japan [email protected]
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
Varshapriya J N Asst. Professor, Dept. of Computer Engineering and IT Veermata Jijabai Technological Institute Mumbai, India
Analytical Survey of Security in Virtualized Environment Nilambari Joshi Dept. of Computer Engineering and IT Veermata Jijabai Technological Institute Mumbai, India Varshapriya J N Asst. Professor, Dept.
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,
Design and Implementation of Techniques for Secure Virtualization in Cloud Environment
Design and Implementation of Techniques for Secure Virtualization in Cloud Environment Apurva R. Pisalkar Prof. M. V. Bramhe PG Scholar Associate professor St. Vincent Pallotti College of Engg & Tech,.
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections Abhinav Srivastava and Jonathon Giffin School of Computer Science Georgia Institute of Technology Attacks Victim System Bot
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!
Securely Isolating Malicious OS Kernel Modules Using Hardware Virtualization Support
Journal of Computational Information Systems 9: 13 (2013) 5403 5410 Available at http://www.jofcis.com Securely Isolating Malicious OS Kernel Modules Using Hardware Virtualization Support Zhixian CHEN
LSM-based Secure System Monitoring Using Kernel Protection Schemes
LSM-based Secure System Monitoring Using Kernel Protection Schemes Takamasa Isohara, Keisuke Takemori, Yutaka Miyake KDDI R&D Laboratories Saitama, Japan {ta-isohara, takemori, miyake}@kddilabs.jp Ning
Emerging Security Challenges of Cloud Virtual Infrastructure
In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 th Nov 2010. Emerging Security Challenges of Cloud Virtual Infrastructure Amani S. Ibrahim, James Hamlyn-Harris and John Grundy Computer
DACSA: A Decoupled Architecture for Cloud Security Analysis
DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta 1, Ahmed Azab 3, William Enck 1, Peng Ning 1, and Xiaolan Zhang 2 1 North Carolina State University {jjgionta,whenck,pning}@ncsu.edu
A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service
78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,
Hypervisor-based Background Encryption
-based Background Encryption Yushi OMOTE University of Tsukuba Full-Disk Encryption (FDE) Recent study shows 10% of laptop computers are lost or stolen every year* To prevent data breach, many organizations
A Threat Model for a Cloud Infrastructure with no Hypervisor
A Threat Model for a Cloud Infrastructure with no Hypervisor William A. R. de Souza, Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill, Egham, United Kingdom Abstract
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Implementation of a Purely Hardware-assisted VMM for x86 Architecture
Implementation of a Purely Hardware-assisted VMM for x86 Architecture Saidalavi Kalady, Dileep P G, Krishanu Sikdar, Sreejith B S, Vinaya Surya, Ezudheen P Abstract Virtualization is a technique for efficient
OSes. Arvind Seshadri Mark Luk Ning Qu Adrian Perrig SOSP2007. CyLab of CMU. SecVisor: A Tiny Hypervisor to Provide
SecVisor: A Seshadri Mark Luk Ning Qu CyLab of CMU SOSP2007 Outline Introduction Assumption SVM Background Design Problems Implementation Kernel Porting Evaluation Limitation Introducion Why? Only approved
Survey On Hypervisors
Survey On Hypervisors Naveed Alam School Of Informatics and Computing Indiana University Bloomington [email protected] ABSTRACT Virtual machines are increasing in popularity and are being widely adopted.
Leveraging Thin Hypervisors for Security on Embedded Systems
Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical
Performance Measuring and Comparison of VirtualBox and VMware
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Measuring and Comparison of VirtualBox and VMware Vasudevan.M.S
Advanced Computer Networks. Network I/O Virtualization
Advanced Computer Networks 263 3501 00 Network I/O Virtualization Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week: Today: Software Defined
Procedia Computer Science
Procedia Computer Science 00 (2011) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia WCIT-2011 Host Based Anomaly Detection Using a Combination of Artificial Immune Systems and Hypervisor
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Virtualization of Wireless LAN Infrastructures
Virtualization of Wireless LAN Infrastructures IDAACS 2011 IEEE 6th International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 15-17 September 2011,
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
CMPS223 Final Project Virtual Machine Introspection Techniques
CMPS223 Final Project Virtual Machine Introspection Techniques Michael Sevilla University of California, Santa Cruz [email protected] December 4, 2012 1 Introduction This work is a survey of Virtual
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Guardian: Hypervisor as Security Foothold for Personal Computers
Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),
Monitoring VirtualBox Performance
1 Monitoring VirtualBox Performance Siyuan Jiang and Haipeng Cai Department of Computer Science and Engineering, University of Notre Dame Email: [email protected], [email protected] Abstract Virtualizers on Type
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines
4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines ANDO Ruo, MIWA Shinsuke, KADOBAYASHI Youki, and SHINODA Yoichi Recently, rapid advances of CPU processor
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Outline. Introduction. State-of-the-art Forensic Methods. Hardware-based Workload Forensics. Experimental Results. Summary. OS level Hypervisor level
Outline Introduction State-of-the-art Forensic Methods OS level Hypervisor level Hardware-based Workload Forensics Process Reconstruction Experimental Results Setup Result & Overhead Summary 1 Introduction
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu
Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment More Amar [email protected] Kulkarni Anurag [email protected] Kolhe Rakesh [email protected] Kothari Rupesh
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Lares: An Architecture for Secure Active Monitoring Using Virtualization Bryan D. Payne Martim Carbone Monirul Sharif Wenke Lee School of Computer Science Georgia Institute of Technology Atlanta, Georgia
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Cloud Computing through Virtualization and HPC technologies
Cloud Computing through Virtualization and HPC technologies William Lu, Ph.D. 1 Agenda Cloud Computing & HPC A Case of HPC Implementation Application Performance in VM Summary 2 Cloud Computing & HPC HPC
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Toward a practical HPC Cloud : Performance tuning of a virtualized HPC cluster
Toward a practical HPC Cloud : Performance tuning of a virtualized HPC cluster Ryousei Takano Information Technology Research Institute, National Institute of Advanced Industrial Science and Technology
Comparison of Memory Balloon Controllers
Comparison of Memory Balloon Controllers Presented by: PNVS Ravali Advisor: Prof. Purushottam Kulkarni June 25, 2015 Ravali, CSE, IIT Bombay M.Tech. Project Stage 2 1/34 Memory Overcommitment I Server
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Workstation Virtualization Software Review. Matthew Smith. Office of Science, Faculty and Student Team (FaST) Big Bend Community College
Workstation Virtualization Software Review Matthew Smith Office of Science, Faculty and Student Team (FaST) Big Bend Community College Ernest Orlando Lawrence Berkeley National Laboratory Berkeley, CA
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
Resource usage monitoring for KVM based virtual machines
2012 18th International Conference on Adavanced Computing and Communications (ADCOM) Resource usage monitoring for KVM based virtual machines Ankit Anand, Mohit Dhingra, J. Lakshmi, S. K. Nandy CAD Lab,
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment NasrinSulthana.M 1 1 Rajalakshmi Engineering College, CSE, [email protected] Sujitha.G 2 2 Rajalakshmi Engineering College,
Cisco Prime Home 5.0 Minimum System Requirements (Standalone and High Availability)
White Paper Cisco Prime Home 5.0 Minimum System Requirements (Standalone and High Availability) White Paper July, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public
Secure In-VM Monitoring Using Hardware Virtualization
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif Georgia Institute of Technology Atlanta, GA, USA [email protected] Wenke Lee Georgia Institute of Technology Atlanta, GA, USA [email protected]
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
VMDriver: A Driver-based Monitoring Mechanism for Virtualization
VMDriver: A Driver-based Monitoring Mechanism for Virtualization Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao Huazhong University of Science and Technology, Wuhan, 430074, China Samsung
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
