Hypertracing: Tracing Through Virtualization Layers
نویسندگان
چکیده
منابع مشابه
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks
Spraying is a common payload delivery technique used by attackers to execute arbitrary code in presence of Address Space Layout Randomisation (ASLR). In this paper we present Graffiti, an efficient hypervisorbased memory analysis framework for the detection and prevention of spraying attacks. Compared with previous solutions, our system is the first to offer an efficient, complete, extensible, ...
متن کاملOptimization Models for Flexible and Adaptive SDN Network Virtualization Layers
Network hypervisors provide the network virtualization layer for Software Defined Networking (SDN). They enable virtual network (VN) tenants to bring their SDN controllers to program their logical networks individually according to their demands. In order to make use of the high flexibility of virtual SDN networks and to provide high performance, the deployment of the virtualization layer needs...
متن کاملEnhancing the Disaster Recovery Plan Through Virtualization
Currently, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, and security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this article is to delineate how vir...
متن کاملSafe and scalable build automation through virtualization
Hardware virtualization is often used to achieve isolation of one application from another, while still allowing to run the applications on the same physical hardware for better utilization; using separate machines might have been an alternative. Often, people associate this scenario with long-running tasks, such as web servers or other services offered in the network. In this paper, we discuss...
متن کاملProtecting Mobile Agents through Tracing
Mobile code systems provide a exible and powerful platform to build distributed applications in an Internet scale, but they rise strong requirements from the security point of view. Security issues include authentication of the di erent remote parties involved and protection of the execution environments from malicious agents. Nonetheless, the most di cult task is to protect roaming agents from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2021
ISSN: 2168-7161,2372-0018
DOI: 10.1109/tcc.2018.2874641