Добірка наукової літератури з теми "Virtual machine escape"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Virtual machine escape".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Virtual machine escape":

1

V. Samuel Blessed Nayagam, P., and A. Shajin Nargunam. "Secure Data Verification and Virtual Machine Monitoring." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 574. http://dx.doi.org/10.14419/ijet.v7i4.36.24140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Powerfully configurable virtualized assets make the physical area of the information and process autonomous of its portrayal and the clients have no influence over the physical arrangement of information and running procedure. In a multi-cloud condition the layer of deliberation between the physical equipment and virtualized frameworks gives a great way to convey cost reserve funds through server union and also expanded operational productivity and adaptability. This additional usefulness presents a virtualization layer that it turns into a chance of assault for the facilitated virtual administrations. The proposed access control show ensures virtual machines by receiving access control at various layers. The information shading plan help to secure the virtualized information utilized in the virtual machines. The information confirmation structure, which gives a grouping of trust wipes out the untrusted special virtual machines, and additionally utilize the confided in processing standards to guarantee the respectability of the checking condition. Safeguarding security plot ceaselessly screens the working and trade of information between the virtual machine. The test results demonstrate that this plan can viably counteract virtual machine escape without influencing the general productivity of the framework.
2

LIU, Xiao-zhen, and Huan-zhou LI. "Escape technique of AVM2 virtual machine based on verification deception." Journal of Computer Applications 30, no. 8 (September 6, 2010): 2130–33. http://dx.doi.org/10.3724/sp.j.1087.2010.02130.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wu, Jiang, Zhou Lei, Shengbo Chen, and Wenfeng Shen. "An Access Control Model for Preventing Virtual Machine Escape Attack." Future Internet 9, no. 2 (June 2, 2017): 20. http://dx.doi.org/10.3390/fi9020020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Fan, Wei, and Weiqing Huang. "Elevated Penetration Attack Models of Virtual Machine Escape Based on FSM." ICST Transactions on Security and Safety 8, no. 27 (January 8, 2021): 170555. http://dx.doi.org/10.4108/eai.21-7-2021.170555.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Feng, Wei, Xiaohua Shi, and Wenru Wang. "Eliminating object reference checks by escape analysis on real-time Java virtual machine." Cluster Computing 22, S4 (February 27, 2018): 9323–34. http://dx.doi.org/10.1007/s10586-018-2145-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhang, Shuhui, Xiangxu Meng, Lianhai Wang, Lijuan Xu, and Xiaohui Han. "Secure Virtualization Environment Based on Advanced Memory Introspection." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/9410278.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM) security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, a novel approach for VM memory forensics based on the virtual machine control structure (VMCS) is put forward. By analyzing the memory of the host machine, the running VMs can be detected and their high-level semantic information can be reconstructed. Then, malicious activity in the VMs can be identified in a timely manner. Moreover, by mutually analyzing the memory content of the host machine and VMs, VM escape may be detected. Compared with previous memory introspection technologies, our solution can automatically reconstruct the comprehensive running state of a target VM without any prior knowledge and is strongly resistant to attacks with high reliability. We developed a prototype system called the VEDefender. Experimental results indicate that our system can handle the VMs of mainstream Linux and Windows OS versions with high efficiency and does not influence the performance of the host machine and VMs.
7

Bartels, John R., Dean H. Ambrose, and Sean Gallagher. "Effect of Operator Position on the Incidence of Continuous Mining Machine/Worker Collisions." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 20 (October 2007): 1416–20. http://dx.doi.org/10.1177/154193120705102009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Remote operation of continuous miners has enhanced the health and safety of underground miners in many respects; however, numerous fatal and non-fatal continuous miner struck-by accidents have occurred when using remote controls. In an effort to prevent these injuries, NIOSH researchers at Pittsburgh Research Laboratory examined the workplace relationships between continuous miner operators and various tramming modes of the equipment using motion captured data, predicted operator response times, and field- of- view data to determine causes of operator-machine struck-by events in a virtual mine environment. Factors studied included machine speed, direction of escape, operator facing orientation relative to the machine, work posture, distance from machine, and operator anthropometry. Close proximity to the machine, high machine tramming speeds, a right-facing orientation and operator positioning near the tail all resulted in high risk of being struck. It is hoped that this data will provide an improved rationale for operator positioning for remotely operated continuous miners.
8

Cohen Ibañez, Emily. "Military Utopias of Mind and Machine." Catalyst: Feminism, Theory, Technoscience 2, no. 1 (April 22, 2016): 1–36. http://dx.doi.org/10.28968/cftt.v2i1.28828.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The central locus of my study is southern California, at the nexus of the Hollywood entertainment industry, the rapidly growing game design world, and military training medical R&D. My research focuses on the rise of military utopic visions of mind that involve the creation of virtual worlds and hyper-real simulations in military psychiatry. In this paper, I employ ethnography to examine a broader turn to the senses within military psychology and psychiatry that involve changes in the ways some are coming to understand war trauma, PTSD, and what is now being called "psychological resilience." In the article, I critique assumptions that are made when what is being called "a sense of presence" and "immersion" are given privileged attention in military therapeutic contexts, diminishing the subjectivity of soldiers and reducing meaning to biometric readings on the surface of the body. I argue that the military's recent preoccupation with that which can be described as "immersive" and possessing a sense of presence signals a concentrated effort aimed at what might be described as a colonization of the senses – a digital Manifest Destiny that envisions the mind as capital, a condition I am calling military utopias of mind and machine. Military utopias of mind and machine aspire to have all the warfare without the trauma by instrumentalizing the senses within a closed system. In the paper, I argue that such utopias of control and containment are fragile and volatile fantasies that suffer from the potential repudiation of their very aims. I turn to storytelling, listening, and conversations as avenues towards healing, allowing people to ascribe meaning to difficult life experiences, affirm social relationships, and escape containment within a closed language system.
9

Suchoples, Jarosław. "The birth of the legend: The odyssey of the cruiser Emden as presented by German daily newspapers, 1914–1915." International Journal of Maritime History 29, no. 3 (August 2017): 544–68. http://dx.doi.org/10.1177/0843871417712211.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
From August to early November 1914, the effectiveness of a lone German commerce-raider, the light cruiser Emden eventually brought the bulk of Allied cargo-shipping in the Bay of Bengal and the Indian Ocean to a virtual halt, thus hampering their war effort in Europe. Although the Emden was finally destroyed at the battle of the Cocos Islands, the press were able to continue the story relating the daring escape of some of her crew. The escapees got away from Direction Island in the Cocos in a requisitioned sailing schooner, the Ayesha. What followed were several months of dangerous and arduous progress first through the Indian Ocean, then through Arabia, finally reaching Constantinople and thence to Germany. Theirs was the only German military unit that returned home from overseas and their story was a gift for German propagandists. Scanning the contemporary German newspapers it becomes clear that they were determined to make the most of this story. It was about German seafarers whose courage and chivalrous attitude towards their enemies should be publicly recognised. It was likewise appreciated by the British. During 1914 and 1915, the German daily press kept the public regularly informed about the Emden whenever there was any news. The legend steadily grew to become a permanent and indisputably positive element of the German collective memory and military tradition. Because the news only came intermittently it became all the more exciting for their readers to follow. The press material is stored as a collection of clippings in the Federal Archive (Bundesarchiv) in Berlin, which clearly shows how the narrative unfolded. It was soon taken up by the German propaganda machine to boost the morale of the German people. Reading the articles it is clear that the editors seized upon this as a story of heroic deeds, allowing them to present their countrymen as super-men who proved the superiority of the German fighting man.
10

Bogolepov, Sergey S. "Development of Kotlin / Native Intermediate Representation and Optimizations." Vestnik NSU. Series: Information Technologies 18, no. 2 (2020): 15–30. http://dx.doi.org/10.25205/1818-7900-2020-18-2-15-30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Kotlin is a statically typed programming language that supports object-oriented and functional programming. It supports JVM, JS and native platforms via LLVM (Kotlin / Native). The first two targets are backed with well-developed virtual machines that can perform advanced program optimizations at runtime. However, for native platforms, all optimizations must be performed at compile time. Currently Kotlin / Native lacks many optimizations, which is why the performance of the generated code is poor in many cases. This paper describes a way to solve this problem by introducing an additional SSA-based intermediate representation and implementing escape analysis using it. Experimental results have shown that this approach can significantly improve performance.

Дисертації з теми "Virtual machine escape":

1

Lingaas, Türk Jakob. "Living off the Land Binaries with Virtual Machines." Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44842.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures).This thesis attempts to use virtual machines as a living of the land binary. By utilizing the virtualenvironment of Windows iso images within a hypervisor, the attacker can download and execute abinary without being stopped by the bare metal host’s IDS or IPS. As the attacker controls the virtualenvironment, they can disable Windows Defender within the virtual machine and acquire theransomware without the upper layer of IDS or IPS even noticing, meaning they also remain stealthyfor a persistent engagement. The attacker would then proceed to use the share folder functionalityof the hypervisor and target a directory with sensitive files, before executive the binary within thevirtual machine. To the bare metal host, it would look like a hypervisor process is affecting the fileswithin the shared folder, which does not raise any alarms. However, what is actually happening is theransomware of the attacker’s choice has encrypted the files of the target directory (or mounteddrive, depending on method used), and can now continue to the next directory (or drive).The results of this work showed that virtual machines can be used for living off the land binariesattacks by utilizing either the shared folder functionality of a specific hypervisor, or by mounting adrive to a virtual machine. The experiments were proven to work within their own parameters,assuming certain requirements are fulfilled for the attack to be doable. Defenders can tweak IDS andIPS policies to limit or warn when a user access or changes partitions or limiting the accessibility forthe hypervisors native to the machine.

Книги з теми "Virtual machine escape":

1

Meston, Zach. 3DO Games Secrets: Book Two. Maui, HI: Sandwich Islands Publishing, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Virtual machine escape":

1

Dubrulle, P., R. Sirdey, P. Dore, M. Aichouch, and E. Ohayon. "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities." In 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE, 2015. http://dx.doi.org/10.1109/indin.2015.7281938.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Alnaim, Abdulrahman, Ahmed Alwakeel, and Eduardo B. Fernandez. "A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV." In ARES '19: 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3339252.3340530.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Marques, Jonatas Adilson, and Rafael Rodrigues Obelheiro. "Escada: Predicting Virtual Machine Network Bandwidth Demands for Elastic Provisioning in IaaS Clouds." In 2017 International Conference on Cloud and Autonomic Computing (ICCAC). IEEE, 2017. http://dx.doi.org/10.1109/iccac.2017.9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії