0000000000916841

AUTHOR

Nezer J. Zaidenberg

showing 2 related works from this author

Preventing Execution of Unauthorized Native-Code Software

2017

The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…

cybersecuritywhitelistingtrusted computinghypervisorattestationAPT-protection
researchProduct

Applications of Virtualization in Systems Design

2012

internet streamingQEMUasynchronous mirroringvirtualisointiLLVMcloud computingtrusted computingsysteemityötietotekniikkavirtualizationKVMstorage virtualization
researchProduct