2017
DOI: 10.1007/s00500-017-2745-x
|View full text |Cite
|
Sign up to set email alerts
|

Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Similarly, Dinaburg et al proposed the malware analysis framework Ether [14], which can trace the instruction execution, memory writes, and system calls. Zhan et al proposed the solution of kernel control flow integrity based on the virtualization [39], but it provided protections on the page-level check. In addition, Deng et al proposed the more stealthy binary instrumentation framework SPIDER [18], which can trap the target program by invisible breakpoints.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Dinaburg et al proposed the malware analysis framework Ether [14], which can trace the instruction execution, memory writes, and system calls. Zhan et al proposed the solution of kernel control flow integrity based on the virtualization [39], but it provided protections on the page-level check. In addition, Deng et al proposed the more stealthy binary instrumentation framework SPIDER [18], which can trap the target program by invisible breakpoints.…”
Section: Related Workmentioning
confidence: 99%
“…With the development of virtual machine introspection (VMI) [4] technique, agentless security tools are widely be used because of the security and transparency features, such as virtual machine monitoring [20,21], virus analysis [22], etc. In addition, CloudVMI [23] provides the VMI service for cloud users.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the isolation of the hypervisor, VMI‐based monitors are more secure and transparent. VMI technique is widely used for VM security, such as checking the control flow integrity,() protecting critical files, and monitoring processes. () With the development of cloud computing, many VMI‐based security tools are proposed to protect VMs in cloud.…”
Section: Related Workmentioning
confidence: 99%