2018
DOI: 10.1155/2018/9410278
|View full text |Cite
|
Sign up to set email alerts
|

Secure Virtualization Environment Based on Advanced Memory Introspection

Abstract: Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM) security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Multiple instances of different operating systems can share virtualized hardware resources. A hypervisor installation is installed on the server hardware to run guest operating systems [3].…”
Section: Background Virtualization Componentsmentioning
confidence: 99%
See 2 more Smart Citations
“…Multiple instances of different operating systems can share virtualized hardware resources. A hypervisor installation is installed on the server hardware to run guest operating systems [3].…”
Section: Background Virtualization Componentsmentioning
confidence: 99%
“…In this architecture, privileged partitions display and control virtual machines. This approach creates a highly controllable environment and can use additional security tools such as intrusion detection systems [2]. However, it is vulnerable because the hypervisor has one point of failure.…”
Section: Figure 3 Hypervisor Based Virtualizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, through interpreting the memory quintessence of the VMs and host machine, VM escape could be detected by observing the abnormal attitude pattern of the host machine. So far, a relevant written work to solve the problem of VM escape detection has not been found yet [14].…”
Section: Counter Measuresmentioning
confidence: 99%
“…VMI strengthen it with a stealthy and in-depth view into the behavior of malware. VEDefender [22] uses a hardware-based approach to acquire the physical memory of the host machine. XScope [23] detects malicious applications with memory introspection.…”
Section: Introductionmentioning
confidence: 99%