2008
DOI: 10.1109/sp.2008.24
|View full text |Cite
|
Sign up to set email alerts
|

Lares: An Architecture for Secure Active Monitoring Using Virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
149
0
2

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 301 publications
(159 citation statements)
references
References 20 publications
1
149
0
2
Order By: Relevance
“…sHype [43] proposes a hypervisor to secure VM interactions, VMGuard [21] is a technique for protecting the management VM in Xen. A number of efforts use introspection to identify the presence of malicious code [4,47,33,23,27,26,37,38]. Other works use the hypervisor to protect the guest OSes [45,29,40].…”
Section: Software Approachesmentioning
confidence: 99%
“…sHype [43] proposes a hypervisor to secure VM interactions, VMGuard [21] is a technique for protecting the management VM in Xen. A number of efforts use introspection to identify the presence of malicious code [4,47,33,23,27,26,37,38]. Other works use the hypervisor to protect the guest OSes [45,29,40].…”
Section: Software Approachesmentioning
confidence: 99%
“…VM introspection for intrusion detection and prevention Over the last decade, there has been a significant push to move the security stack from VMs into regions protected by the hypervisor [23,30]. With the proliferation of kernelmode rootkits, this elevated protection has become ever more important [3,13].…”
Section: Intrusion Detection and Analysismentioning
confidence: 99%
“…A number of malware protection proposals ( [10,16,23,25,31,40]) address the issue by using virtualization, creating a trusted zone from which their monitoring programs can operate and relying on a hypervisor to moderate between the host system and the monitor. These proposals, however, fail to take the inherent resource constraints of embedded control systems into account.…”
Section: The Problem With Virtualizationmentioning
confidence: 99%
“…If desired, Autoscopy can be used in conjunction with other programs that alter the control flow of a system for security or other legitimate reasons (for example, Lares [23] from Payne et al, although it also uses a VM). Autoscopy will simply tag the program's behavior as trusted during the learning phase.…”
Section: Flexibility Across Multiple Architecturesmentioning
confidence: 99%