2010 International Conference on Computational Science and Its Applications 2010
DOI: 10.1109/iccsa.2010.79
|View full text |Cite
|
Sign up to set email alerts
|

NOPFIT: File System Integrity Tool for Virtual Machine Using Multi-byte NOP Injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…al. suggest a multi-byte NOP injection with a FIT is to provide an increased performance threshold for file integrity monitoring [11]. The authors argue that traditional FIT infrastructures installed must first have security polices predefined with a lower performance threshold due to the amount of time it takes to intercept system-calls.…”
Section: Virtual Machines Fim 1) Multi-byte No-operation (Nop) Injmentioning
confidence: 98%
See 3 more Smart Citations
“…al. suggest a multi-byte NOP injection with a FIT is to provide an increased performance threshold for file integrity monitoring [11]. The authors argue that traditional FIT infrastructures installed must first have security polices predefined with a lower performance threshold due to the amount of time it takes to intercept system-calls.…”
Section: Virtual Machines Fim 1) Multi-byte No-operation (Nop) Injmentioning
confidence: 98%
“…Also, a Kernel object parser is used to determine when there has been any stack-pointer changes within the current kernel, and is also used to monitor activity. Finally two different FIT implementations (NOPFIT and INT3FIT) were compared and results indicated that the NOPFIT took approximately 900 ms less than the INT3FIT utilization [11].…”
Section: Virtual Machines Fim 1) Multi-byte No-operation (Nop) Injmentioning
confidence: 99%
See 2 more Smart Citations
“…For that reason, file system integrity must be continuously ensured, especially in the context of multitenant cloud services. Several file system integrity tools are already developed and allow administrators to automatically detect system changes and malicious file modifications [28]. However, the concept of file system integrity validation has to be adjusted for virtualized cloud environments.…”
Section: Intrusion Anomaly and Behavior Of Malware Detectionmentioning
confidence: 99%