A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Fluorescence: Detecting Kernel-Resident Malware in Clouds
International Symposium on Recent Advances in Intrusion Detection
Kernel-resident malware remains a significant threat. An effective way to detect such malware is to examine the kernel memory of many similar (virtual) machines, as one might find in an enterprise network or cloud, in search of anomalies: i.e., the relatively rare infected hosts within a large population of healthy hosts. It is challenging, however, to compare the kernel memories of different hosts against each other. Previous work has relied on knowledge of specific kernelse.g., the locationsdblp:conf/raid/LiD0RME19 fatcat:nudvh7o2bfhdnoqs2iysy267le