Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we present the CloudPhylactor architecture. It harnesses the mandatory access control of Xen to grant dedicated monitoring virtual machines the ...
Abstract—Virtual machine introspection is a valuable ap- proach for malware analysis and forensic evidence collection on virtual machines.
... In this section, we discuss the CloudPhylactor architecture, which aims to provide VMI-based monitoring mechanisms to cloud tenants. The discussion is based ...
The CloudPhylactor architecture harnesses the mandatory access control of Xen to grant dedicated monitoring virtual machines the rights to access the main ...
In this paper, we present the CloudPhylactor architecture. It harnesses the mandatory access control of Xen to grant dedicated monitoring virtual machines the ...
Dec 16, 2015 · Virtual machine introspection (VMI) can be used for several security relevant objectives such as in- trusion detection, malware analysis or ...
Missing: Data Centers.
Cloudphylactor: Harnessing mandatory access control for virtual machine introspection in cloud data centers. B Taubmann, N Rakotondravony, HP Reiser.
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers ... virtual machines the rights to access the ...
Rakotondravony, H. P. Reiser, CloudPhylactor: harnessing mandatory access control for virtual machine introspection in cloud data centers, in: IEEE TrustCom ...