Search results for "cyber protection"

showing 1 items of 1 documents

Enforcing trust for execution-protection in modern environments

2016

The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. Modern processors contain hardware virtualization capabilities that support implementation of hypervisors for the purpose of managing multiple Virtual-Machines (VMs) on a single computer platform. The facilities provided by hardware virtualization grant the hypervisor control of the hardware platform at an effective privil…

pääsynvalvontavirtuaalikoneetvirtualisointiwhitelistingAPT preventiontrusted computinghypervisoritcyber protectionhypervisortietoturvavirtualizationattestationthin-hypervisor
researchProduct