Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jonas Pfoh"'
Publikováno v:
DEXA Workshops
As the ARM architecture has become the favored platform for the fastest growing computing segment, the mobile market, establishing a sound security architecture on the platform is paramount. The frightening increase in malware for the Android and iOS
Publikováno v:
NDSS
As protection mechanisms become increasingly advanced, so too does the malware that seeks to circumvent them. Protection mechanisms such as secure boot, stack protection, heap protection, W X , and address space layout randomization have raised the b
Publikováno v:
Network and System Security ISBN: 9783642386305
NSS
NSS
Signature-based malware detection will always be a step behind as novel malware cannot be detected. On the other hand, machine learning-based methods are capable of detecting novel malware but classification is frequently done in an offline or batche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee480d1e7c464acbbbb2bd9dd0e6979f
https://doi.org/10.1007/978-3-642-38631-2_16
https://doi.org/10.1007/978-3-642-38631-2_16
Publikováno v:
Advances in Information and Computer Security ISBN: 9783642251405
IWSEC
IWSEC
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. This lends itself well to security applications, though the hardware virtualization support from Intel and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3454c2cf3e8aa24ecdbe48c9ccd325a9
https://doi.org/10.1007/978-3-642-25141-2_7
https://doi.org/10.1007/978-3-642-25141-2_7
Publikováno v:
Information Systems Security ISBN: 9783642255595
ICISS
ICISS
All systems that utilize virtual machine introspection (VMI) need to overcome the disconnect between the low-level state that the hypervisor sees and its semantics within the guest. This problem has become well-known as the semanticgap. In this work,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b2f0a146eac4fab5f3824c1d993f4a1
https://doi.org/10.1007/978-3-642-25560-1_25
https://doi.org/10.1007/978-3-642-25560-1_25
Publikováno v:
SECURWARE
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. Using knowledge of the virtual hardware architecture, it is possible to derive information about a guest op
Publikováno v:
Proceedings of the 1st ACM workshop on Virtual machine security.
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. In this paper, we present a formal discussion of the development of VMI-based security applications. We beg