2012 IEEE Fifth International Conference on Cloud Computing 2012
DOI: 10.1109/cloud.2012.145
|View full text |Cite
|
Sign up to set email alerts
|

Maitland: Lighter-Weight VM Introspection to Support Cyber-security in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…The detection of encrypted malware is very challenging. Maitland [28] is a VMI-based development effort to detect encrypted malware. There is a new breed of malware, which successfully hides itself, when it becomes aware of malware detection code running on the system.…”
Section: Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The detection of encrypted malware is very challenging. Maitland [28] is a VMI-based development effort to detect encrypted malware. There is a new breed of malware, which successfully hides itself, when it becomes aware of malware detection code running on the system.…”
Section: Malware Detectionmentioning
confidence: 99%
“…Maitland [28] uses the Xen store utility and page flags for accessing NX flags. Maitland observes each page fault and makes these pages accessible to a security VM.…”
Section: Introspection Using Page Flag Inspectionmentioning
confidence: 99%
“…The architecture runs in between software and hardware layer. Benninger and Neville [49] have presented a prototype that performs detection of malwares. The faster outcome of the intrusion detection proved quite effective system.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…They implement Renovo's generic unpacking algorithm on Ether. Benninger et al [22] and Deng et al [23] independently propose that type of analysis environments by customizing Xen and KVM, respectively. Kawakoya et al [10] focus on memory access 'write', 'read', and 'execute' of packed programs to detect the OEP, and Jeong et al [24] focus on entropy scores in each section of a packed program on the memory to do so.…”
Section: Related Workmentioning
confidence: 99%