Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Baozeng Ding"'
Publikováno v:
IET Information Security. 7:349-354
Hypervisors are becoming a widespread virtualisation layer in current computer systems. Recent successful attacks against hypervisors indicate that they face the similar integrity threats as traditional operating systems. Current approaches that secu
Publikováno v:
SERE (Companion)
Continuing bug reports and exploits in hyper visors indicate that hyper visors face similar integrity threats as tradition software. Previous approaches to protect a hyper visor that utilize hardware features are not easy to be extended. Besides, the
Publikováno v:
SERE (Companion)
Virtualization has been widely adopted in current computer systems. A key part of virtualization is a hyper visor, which virtualizes physical resources to be shared among multiple guest virtual machines (VMs). Configuration files and security policy
Publikováno v:
ISSRE Workshops
Baggy Bounds Checking is a backward-compatible defense against out-of-bounds errors. It is reported as being faster than any previous bounds checking tool. However, it enforces allocation bounds instead of object bounds and thus cannot detect memory
Publikováno v:
ARES
In this paper, we present an approach to attackon the Xen hypervisor utilizing return-oriented programming(ROP). It modifies the data in the hypervisor that controlswhether a VM is privileged or not and thus can escalatethe privilege of an unprivileg
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
SEC
The Flask architecture, which mainly contains object manager (OM) and security server (SS), is widely used to support flexible security policies in operating system. In nature, OM and SS should be isolated from each other to separate decision from en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::27a319059be53f91b605d05d95e45eae
https://doi.org/10.1007/978-3-642-30436-1_10
https://doi.org/10.1007/978-3-642-30436-1_10
Publikováno v:
Information Security Practice & Experience (9783642291005); 2012, p289-300, 12p