2018
DOI: 10.1007/978-3-319-93563-8_12
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Mitigation of Kernel Rootkits in Cloud Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…MOSKG [34] utilizes the virtualization technology to protect critical kernel data. Jonathan Grimm et al [10] present a rootkit defense mechanism based on the virtualization technology. In our previous work [28], we propose a virtualization-based protection mechanism against vulnerable kernel modules.…”
Section: Virtualization-based Methodsmentioning
confidence: 99%
“…MOSKG [34] utilizes the virtualization technology to protect critical kernel data. Jonathan Grimm et al [10] present a rootkit defense mechanism based on the virtualization technology. In our previous work [28], we propose a virtualization-based protection mechanism against vulnerable kernel modules.…”
Section: Virtualization-based Methodsmentioning
confidence: 99%
“…An alternative solution has been proposed by Grimm et al, 20 which seeks to automatically identify and disable rootkit malware by restoring normal system control flows. The system employed virtual machine (VM) introspection, which allows a privileged VM to view and manipulate the physical memory of other VMs with the aid of a hypervisor.…”
Section: Related Workmentioning
confidence: 99%