Search

Your search keyword '"virtual machine introspection"' showing total 206 results

Search Constraints

Start Over You searched for: Descriptor "virtual machine introspection" Remove constraint Descriptor: "virtual machine introspection"
206 results on '"virtual machine introspection"'

Search Results

1. Malware detection for container runtime based on virtual machine introspection.

2. Retrofitting AMD x86 Processors with Active Virtual Machine Introspection Capabilities

3. SeqTrace: API Call Tracing Based on Intel PT and VMI for Malware Detection

4. An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.

5. A Quest for Best: A Detailed Comparison Between Drakvuf-VMI-Based and Cuckoo Sandbox-Based Technique for Dynamic Malware Analysis

6. (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring

7. A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing

8. Agent-Based File Extraction Using Virtual Machine Introspection

9. Retrofitting LBR Profiling to Enhance Virtual Machine Introspection.

10. DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform

11. VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection

12. Developing a novel methodology for virtual machine introspection to classify unknown malware functions.

13. Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection.

14. Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.

15. On the Trustworthiness of Memory Analysis-An Empirical Study from the Perspective of Binary Execution

16. Automatic Mitigation of Kernel Rootkits in Cloud Environments

17. NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment

18. Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

19. Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence

20. ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation

21. Furnace: Self-service Tenant VMI for the Cloud

22. Active and passive virtual machine introspection on AMD and ARM processors.

23. Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting

24. VMI-based virtual machine remote attestation scheme

25. Reading the contents of deleted and modified files in the virtualization based black-box binary analysis system Drakvuf

26. A Cooperative Approach to Virtual Machine Based Fault Injection

27. Checking Function-Level Kernel Control Flow Integrity for Cloud Computing

28. Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling.

29. Automatic Uncovering of Tap Points from Kernel Executions

30. VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment

31. Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

32. Principles-Driven Forensic Analysis

33. Defeating Kernel Driver Purifier

34. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud

35. Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection

36. A Model of Dynamic Malware Analysis Based on VMI

37. Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

38. CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection

39. Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints

40. Network Security Situation Awareness Framework based on Threat Intelligence.

41. Virtualization security:the good,the bad and the ugly

42. X-TIER: Kernel Module Injection

43. Investigating the Implications of Virtualization for Digital Forensics

44. 基于改进期望值决策法的虚拟机可信审计方法.

45. Research on Semantic Gap Problem of Virtual Machine.

46. Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.

47. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections

48. NODEGUARD : A Virtualized Introspection Security Approach for the Modern Cloud Data Center

49. Tenant-Oriented Monitoring for Customized Security Services in the Cloud

Catalog

Books, media, physical & digital resources