Security Analysis of Encrypted Virtual Machines
نویسندگان
چکیده
منابع مشابه
Security Architecture for Virtual Machines
We propose security architecture based on virtual machine monitor to efficiently deal with attacks on virtual machines. We will show that our model is capable of detecting suspicious processes running in the virtual machine, can detect and prevent different types of attacks including zero day attacks by monitoring the virtual machine traffic and the processes that are generating or receiving th...
متن کاملTowards Modular Security-conscious Virtual Machines
Many system-level concerns such as security and support for real-time workloads are hard to address in existing systems, especially if one of the main platform assets is backward compatibility. Apart from many other applications, virtualization has proven capable in running legacy software. If done right, it may relieve systems developers from the need to stay backward compatible and allows the...
متن کاملSecurity-Aware Dispatching of Virtual Machines in Cloud Environment
The cloud computing as a ubiquitous paradigm could provide different services for internet users and Information Technology (IT) companies through datacenters located around the world. However, cloud provider faces several problems such as security and privacy issues in cloud datacenters. Hence, cloud provider has to handle security challenges to gain more profit. In this paper, a SecurityAware...
متن کاملSecurity of Verifiably Encrypted Signatures
In a verifiably encrypted signature scheme, signers encrypt their signature under the public key of a trusted third party and prove that they did so correctly. The security properties are unforgeability and opacity. Unforgeability states that a malicious signer should not be able to forge verifiably encrypted signatures and opacity prevents extraction from an encrypted signature. This paper pro...
متن کاملSecurity Analysis of Selectively Encrypted MPEG-2 Streams
Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application to date. Here we focus on high encryption savings, targeting 10% of the bit stream or less encry...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGPLAN Notices
سال: 2017
ISSN: 0362-1340,1558-1160
DOI: 10.1145/3140607.3050763