2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 2014
DOI: 10.1109/ucc.2014.165
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 18 publications
0
6
0
1
Order By: Relevance
“…The requested VM with its mentioned specifications has to be placed in the cloud server. Previous research indicates security-as-a service that could be provided and provisioned to the customers according to their security specification and needs [7]. The health of the VM has to also monitor whether the VM which is secured meets the requirements of a healthy VM.…”
Section: B Security In Virtual Machinesmentioning
confidence: 99%
See 2 more Smart Citations
“…The requested VM with its mentioned specifications has to be placed in the cloud server. Previous research indicates security-as-a service that could be provided and provisioned to the customers according to their security specification and needs [7]. The health of the VM has to also monitor whether the VM which is secured meets the requirements of a healthy VM.…”
Section: B Security In Virtual Machinesmentioning
confidence: 99%
“…Past research shows that in order to eliminate side channel attacks, number of solutions have been discussed in [7,10,11].Study indicates that an attacker can achieve coresidency with an estimate of about 40% that could mean that almost 4 attacker VM's out of 10 could co locate a VM victim. The authors, Yi Han et al, have efficiently tried to minimize the number of attacker VM to be co resident with the target VM.…”
Section: B Security In Virtual Machinesmentioning
confidence: 99%
See 1 more Smart Citation
“…Kumara et al [16] presented a virtual machine introspection (VMI) based on malicious process detection approach for VM, which extracted the high level information such as system call, opened known backdoor ports from introspected memory to identify the spurious process. Win et al [17] introduced the mandatory access control (MAC) to protect the in-VM monitoring and the hypervisor, aiming at finally protect the guest VM against attacks with relatively ideal overhead.…”
Section: Introductionmentioning
confidence: 99%
“…С этой целью можно использовать технологию виртуализации машин, предполагающую использование избыточной вычислительной мощности серверов [6][7][8]. Эффект защиты в данном случае достигается за счет того, что для каждого пользователя может быть создана своя виртуальная машина [9,10]. Однако эта технология крайне избыточна и существенно загружает вычислительные ресурсы.…”
unclassified