Security Analysis of Encrypted Virtual Machines

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Architecture for Virtual Machines

We propose security architecture based on virtual machine monitor to efficiently deal with attacks on virtual machines. We will show that our model is capable of detecting suspicious processes running in the virtual machine, can detect and prevent different types of attacks including zero day attacks by monitoring the virtual machine traffic and the processes that are generating or receiving th...

متن کامل

Towards Modular Security-conscious Virtual Machines

Many system-level concerns such as security and support for real-time workloads are hard to address in existing systems, especially if one of the main platform assets is backward compatibility. Apart from many other applications, virtualization has proven capable in running legacy software. If done right, it may relieve systems developers from the need to stay backward compatible and allows the...

متن کامل

Security-Aware Dispatching of Virtual Machines in Cloud Environment

The cloud computing as a ubiquitous paradigm could provide different services for internet users and Information Technology (IT) companies through datacenters located around the world. However, cloud provider faces several problems such as security and privacy issues in cloud datacenters. Hence, cloud provider has to handle security challenges to gain more profit. In this paper, a SecurityAware...

متن کامل

Security of Verifiably Encrypted Signatures

In a verifiably encrypted signature scheme, signers encrypt their signature under the public key of a trusted third party and prove that they did so correctly. The security properties are unforgeability and opacity. Unforgeability states that a malicious signer should not be able to forge verifiably encrypted signatures and opacity prevents extraction from an encrypted signature. This paper pro...

متن کامل

Security Analysis of Selectively Encrypted MPEG-2 Streams

Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application to date. Here we focus on high encryption savings, targeting 10% of the bit stream or less encry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGPLAN Notices

سال: 2017

ISSN: 0362-1340,1558-1160

DOI: 10.1145/3140607.3050763