A1 Journal article (refereed)
Hypervisor-Based White Listing of Executables (2019)


Leon, R. S., Kiperberg, M., Zabag, A. A. L., Resh, A., Algawi, A., & Zaidenberg, N. J. (2019). Hypervisor-Based White Listing of Executables. IEEE Security & Privacy, 17(5), 58-67. https://doi.org/10.1109/MSEC.2019.2910218


JYU authors or editors


Publication details

All authors or editors: Leon, Roee S; Kiperberg, Michael; Zabag, Anat Anatey Leon; Resh, Amit; Algawi, Asaf; Zaidenberg, Nezer J.

Journal or series: IEEE Security & Privacy

ISSN: 1540-7993

eISSN: 1558-4046

Publication year: 2019

Volume: 17

Issue number: 5

Pages range: 58-67

Publisher: IEEE Computer Society Press

Publication country: United States

Publication language: English

DOI: https://doi.org/10.1109/MSEC.2019.2910218

Publication open access: Not open

Publication channel open access:

Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/67289


Abstract

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible.


Keywords: data security; operating systems; Linux; programming; virtualisation

Free keywords: operating systems; databases; virtual machine monitors; Linux; microprogramming; monitoring; image segmentation


Contributing organizations


Ministry reporting: Yes

Reporting Year: 2019

JUFO rating: 2


Last updated on 2022-08-06 at 12:11