Filters








128 Hits in 2.5 sec

Experience Report: An Analysis of Hypercall Handler Vulnerabilities

Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t5wjgfbu4bb3xjbswdgysknzhm" style="color: black;">2014 IEEE 25th International Symposium on Software Reliability Engineering</a> </i> &nbsp;
In this paper, we characterize the hypercall attack surface based on analyzing a set of vulnerabilities of hypercall handlers.  ...  We also demonstrate attacks triggering the considered vulnerabilities and analyze their effects. Finally, we suggest an action plan for improving the security of hypercall interfaces.  ...  ACKNOWLEDGMENT This work is a part of the RELATE project, which is supported by the European Commission under the Seventh Framework Programme FP7 with Grant Agreement No. 264840ITN.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/issre.2014.24">doi:10.1109/issre.2014.24</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/issre/MilenkoskiPAVK14.html">dblp:conf/issre/MilenkoskiPAVK14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/imlr2a6iindplafabdvpprj66e">fatcat:imlr2a6iindplafabdvpprj66e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808172516/https://se2.informatik.uni-wuerzburg.de/pa/uploads/papers/paper-750.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a2/78/a27871820158de557a7bbb4cbfd3fc0d010456ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/issre.2014.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

RandHyp: Preventing Attacks via Xen Hypercall Interface [chapter]

Feifei Wang, Ping Chen, Bing Mao, Li Xie
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a> </i> &nbsp;
Although the main jobs of the hypervisors are to guarantee proper isolation between domains and provide them services, the hypercall interface provided by the hypervisor for cross-layer interactions with  ...  In our approach, even facing a total compromise of a domain, the security of the virtualization platforms can be guaranteed. We have built a prototype called RandHyp based on Xen.  ...  In situations where dom0 is simplified to reduce the vulnerabilities exposed [6] , attackers can turn to compromise domUs. And according to CVE bug reports (e.g.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30436-1_12">doi:10.1007/978-3-642-30436-1_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/agmr54kirfhjzb3m4lojb7liua">fatcat:agmr54kirfhjzb3m4lojb7liua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725110841/https://hal.inria.fr/hal-01518261/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/b7/ffb77da408d5149ae7dc7bcc2bb34cb4f5941de9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30436-1_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Hardware assisted hypervisor introspection

Jiangyong Shi, Yuexiang Yang, Chuan Tang
<span title="2016-05-17">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mc7ytjj3xvdubiwzvjyuch5jcu" style="color: black;">SpringerPlus</a> </i> &nbsp;
Experiment results show that our method can effectively detect hypercall-based attacks with some performance cost.  ...  Abstract In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors.  ...  Acknowledgements This work is supported by the National Natural Science Foundation of China (Grant No. 61170286).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40064-016-2257-7">doi:10.1186/s40064-016-2257-7</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/27330913">pmid:27330913</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC4870477/">pmcid:PMC4870477</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rnmkeglr2bhbtecihoup62e4ua">fatcat:rnmkeglr2bhbtecihoup62e4ua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171011135915/http://publisher-connector.core.ac.uk/resourcesync/data/Springer-OA/pdf/3e0/aHR0cDovL2xpbmsuc3ByaW5nZXIuY29tLzEwLjExODYvczQwMDY0LTAxNi0yMjU3LTcucGRm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/84/5f8418389a36a0a79da187985c91d4466ea55718.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40064-016-2257-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4870477" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Dynamic VM Dependability Monitoring Using Hypervisor Probes

Zachary J. Estrada, Cuong Pham, Fei Deng, Lok Yan, Zbigniew Kalbarczyk, Ravishankar K. Iyer
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5w6d3pcht5epbjxlqokb4rwyta" style="color: black;">2015 11th European Dependable Computing Conference (EDCC)</a> </i> &nbsp;
To demonstrate the usefulness of this framework, we present three sample detectors: an emergency detector for a security vulnerability, an application watchdog, and an infinite-loop detector.  ...  We test our detectors on real applications and demonstrate that those detectors achieve an acceptable level of performance overhead with a high degree of flexibility.  ...  When considering newly reported vulnerabilities, hprobe's simple interface allows one to quickly deploy an out-of-band monitor to detect the vulnerability without modifying the control flow of a running  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/edcc.2015.9">doi:10.1109/edcc.2015.9</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/edcc/EstradaPDYKI15.html">dblp:conf/edcc/EstradaPDYKI15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e6m7hwugm5ajvaf2oltjg5w3na">fatcat:e6m7hwugm5ajvaf2oltjg5w3na</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190516155034/http://publish.illinois.edu/science-of-security-lablet/files/2014/05/Dynamic-VM-Dependability-Monitoring-Using-Hypervisor-Probes.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/82/d2/82d236d0df331988c7482228d63a560316149bae.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/edcc.2015.9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Predicting WCET of automotive software running on virtual machine monitors

J. Yoo, J. Lee, Y. Park, S. Hong
<span title="2012-01-29">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gx5ji5rklzgslijmcpur7zpfne" style="color: black;">International Journal of Automotive Technology</a> </i> &nbsp;
We have performed experiments with the proposed framework by predicting the WCETs of sample programs on various virtual and real machine platforms.  ...  First, we model the WCET of an application as a function of WCETs of system calls provided by a guest OS. Second, we model WCETs of a system call as a function of WCETs of VMM services.  ...  ACKNOWLEDGEMENT The work reported in this paper was supported by Digital Media & Communications R&D Center, Samsung Electronics, Co.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12239-012-0031-6">doi:10.1007/s12239-012-0031-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y6mele3vlfaejehdu3hhtemnc4">fatcat:y6mele3vlfaejehdu3hhtemnc4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721004147/http://s-space.snu.ac.kr/bitstream/10371/81527/2/11-09-14%20IJAT-VM.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/69/9a69ae47ff1492e20556926064722369a96a6a15.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12239-012-0031-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Anception: Application Virtualization For Android [article]

Earlence Fernandes, Alexander Crowell, Ajit Aluri, Atul Prakash
<span title="2014-01-27">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Anception is able to confine many types of malware while supporting unmodified Android applications.  ...  The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1401.6726v1">arXiv:1401.6726v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dolzbphi5zc3rc3vyvkswobv2y">fatcat:dolzbphi5zc3rc3vyvkswobv2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200830063208/https://arxiv.org/pdf/1401.6726v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/45/014542de81465cc558117f9f2e38607805def62b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1401.6726v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

FIMCE

Siqi Zhao, Xuhua Ding
<span title="2018-05-21">2018</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7yeg4m2vdvc3lhbsufi4eiagnm" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
Our work presented in this article begins with an in-depth analysis of memory isolation in a multicore setting.  ...  The incomplete isolation boundary thus becomes an exploitable vulnerability in a multicore setting as it allows for parallel executions.  ...  Security Analysis It remains as an open problem to formally prove the security of a system design (not implementation). Therefore, the security analysis given here is informal.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3195181">doi:10.1145/3195181</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/75dls56oxfarporefzodz6k2me">fatcat:75dls56oxfarporefzodz6k2me</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709122430/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5285&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/e9/dbe9ffc5dd691b670a8ea0b18e2399a97f8370c1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3195181"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Kite

A K M Fazla Mehrab, Ruslan Nikolaev, Binoy Ravindran
<span title="2022-03-28">2022</span> <i title="ACM"> Proceedings of the Seventeenth European Conference on Computer Systems </i> &nbsp;
We also demonstrate that our approach has resilience to an array of CVEs (e.g., CVE-2021-35039, CVE-2016-4963, and CVE-2013-2072), smaller image size, and improved startup time.  ...  We compare our approach against Linux using a number of typical micro-and macrobenchmarks used for networking and storage. Our approach achieves performance similar to that of Linux.  ...  Kite's DHCP server was integrated into an enterprise-level software infrastructure called SAVIOR (Secure Applications in Virtual Instantiations of Roles) system, which was developed as part of the IARPA  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3492321.3519586">doi:10.1145/3492321.3519586</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dacx3zf6ybdrjb2nn7uxusb7lq">fatcat:dacx3zf6ybdrjb2nn7uxusb7lq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220401083353/https://dl.acm.org/doi/pdf/10.1145/3492321.3519586" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/a2/c1a297b8aa7ce6c57ee5fe252ccf11759881fb2b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3492321.3519586"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment

Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS &#39;14</a> </i> &nbsp;
Our experiments suggest that most of the previously known attacks are ineffective in current VMM setups.  ...  Such vulnerabilities either allow an attacker to generate a host-side interrupt or hardware faults, violating expected isolation properties.  ...  We would also like to thank anonymous reviewers for their valuable comments, Mariano Graziano for running certain experiments with DMA attacks as well as Pipacs from PaX team, Olivér Pintér and Hunger  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2590296.2590299">doi:10.1145/2590296.2590299</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/PekLSBFN14.html">dblp:conf/ccs/PekLSBFN14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nm4w4q4ervel3gelgunp56q2qu">fatcat:nm4w4q4ervel3gelgunp56q2qu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809030150/http://old.iseclab.org/people/andrew/download/asia14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/77/1c7727a52185ea1ba1d33444e0778eb86c0d940a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2590296.2590299"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework

A. Vasudevan, S. Chaki, Limin Jia, J. McCune, J. Newsome, A. Datta
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/inod5dqjxfdj3bnjykkklcg7d4" style="color: black;">2013 IEEE Symposium on Security and Privacy</a> </i> &nbsp;
We present the design, implementation, and verification of XMHF-an eXtensible and Modular Hypervisor Framework.  ...  Our experiments indicate that XMHF's performance is comparable to popular high-performance general-purpose hypervisors for the single guest that it supports.  ...  This work was partially supported by NSF grants CNS-1018061, CCF-0424422, CNS-0831440, and an AFOSR MURI on Science of Cybersecurity. Copyright 2012 Carnegie Mellon University and IEEE 3 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2013.36">doi:10.1109/sp.2013.36</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sp/VasudevanCJMND13.html">dblp:conf/sp/VasudevanCJMND13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dugdofrzlfeczkkp5bobzqj2ji">fatcat:dugdofrzlfeczkkp5bobzqj2ji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150924051803/http://www.andrew.cmu.edu/user/liminjia/research/papers/xmhf-oakland13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/a7/d9a78bd766d7d15d7eb39fb03c3465206031e8d4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2013.36"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms

Siqi Zhao, Xuhua Ding
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u2svuludwbbl3kyi56ta4uqumm" style="color: black;">2017 IEEE European Symposium on Security and Privacy (EuroS&amp;P)</a> </i> &nbsp;
This paper firstly provides an in-depth analysis of its effectiveness in the multicore setting; a first in the literature.  ...  By virtue of its architectural niche, FIMCE offers stronger assurance and greater versatility than memory isolation. We have built a prototype of FIMCE and measured its performance.  ...  In Section 6, we report our experiments of FIMCE with password-based decryption and Apache. Malleability.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2017.25">doi:10.1109/eurosp.2017.25</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurosp/ZhaoD17.html">dblp:conf/eurosp/ZhaoD17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4og7nnfmmfhn7m5r2sqmmqzmqe">fatcat:4og7nnfmmfhn7m5r2sqmmqzmqe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307033927/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=4701&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c5/f1/c5f13ae24b0588c3582647776c2e9bdde348777f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2017.25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Speculative Dereferencing of Registers:Reviving Foreshadow [article]

Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss
<span title="2020-08-05">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we provide a systematic analysis of the root cause of this prefetching effect.  ...  Beyond our thorough analysis of these previous works, we also demonstrate new attacks enabled by understanding the root cause, namely an address-translation attack in more restricted contexts, direct leakage  ...  Furthermore, we want to thank Intel and ARM for valuable feedback on an early draft.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.02307v1">arXiv:2008.02307v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2dikjua2svhrfbyxpjzxohuhmy">fatcat:2dikjua2svhrfbyxpjzxohuhmy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200812171941/https://arxiv.org/pdf/2008.02307v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.02307v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage [chapter]

Kevin Leach, Fengwei Zhang, Westley Weimer
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In particular, an increasing number of cloud attacks target resource allocation in cloud environments.  ...  By combining x86-based System Management Mode with Intel Software Guard Extensions, we can ensure the integrity of our accounting information, even when the hypervisor has been compromised by an escaped  ...  In step 1 , the VMM is engaged by a VM guest through preemption or a hypercall to service an I/O request. Using hardware support (q.v.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-66332-6_18">doi:10.1007/978-3-319-66332-6_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/u2rrepxopfey7hvqj6snahmv4i">fatcat:u2rrepxopfey7hvqj6snahmv4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190222205342/http://pdfs.semanticscholar.org/436f/abeb4fde3ae9d7b5595af237c26228e878b9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/43/6f/436fabeb4fde3ae9d7b5595af237c26228e878b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-66332-6_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Using VMM-based sensors to monitor honeypots

Kurniadi Asrigo, Lionel Litty, David Lie
<span title="">2006</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2mcxkgqmsbdxzowhpqmstti7ne" style="color: black;">Proceedings of the 2nd international conference on Virtual execution environments - VEE &#39;06</a> </i> &nbsp;
The performance overhead can be significantly improved by implementing the monitor directly in the privileged code of the VMM, though at the cost of increasing the size of the trusted computing base of  ...  Our results show that our designs give the monitor good visibility into the system and thus, a small number of monitoring sensors can detect a large number of intrusions.  ...  This research was supported in part by an NSERC Discovery Grant.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1134760.1134765">doi:10.1145/1134760.1134765</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/vee/AsrigoLL06.html">dblp:conf/vee/AsrigoLL06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iopz3hoeobf43cblcn6zy726nm">fatcat:iopz3hoeobf43cblcn6zy726nm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100215202531/http://www.usenix.org:80/events/vee06/full_papers/p13-asrigo.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/96/1e/961e99389d77b496a4d3cd9e25ff35f42f7a01af.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1134760.1134765"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Trusted VM Snapshots in Untrusted Cloud Infrastructures [chapter]

Abhinav Srivastava, Himanshu Raj, Jonathon Giffin, Paul England
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
A cloud customer's inability to verifiably trust an infrastructure provider with the security of its data inhibits adoption of cloud computing.  ...  HyperShot additionally generates trusted snapshots of the privileged VM itself, thus contributing to the increased security and trustworthiness of the entire cloud infrastructure.  ...  All experiments are performed on an Intel Quad Core 2.53 GHz machine with 4 GB of memory and Extended Page Table ( EPT) support [16] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33338-5_1">doi:10.1007/978-3-642-33338-5_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6mkqgcd2hjh2vn7emjhfaumeie">fatcat:6mkqgcd2hjh2vn7emjhfaumeie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811223133/http://www.chinacloud.cn/upload/2012-08/12082412403332.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/62/ee624310d44550543fe26fc15bfecc81427869a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33338-5_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 128 results