• Publications
  • Influence
Hypervisor-Based Protection of Code
TLDR
We propose a method that is based on cryptography and virtualization. Expand
  • 4
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
TLDR
We propose a hypervisor-based memory acquisition method that solves the two aforementioned deficiencies. Expand
  • 5
  • PDF
Modern Blue Pills and Red Pills
TLDR
The red pill and blue pill situation on Intel and AMD virtualizations circa 2018 and the eighth generation of core iX CPUs. Expand
  • 3
Hypervisor-Based White Listing of Executables
TLDR
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. Expand
  • 1
System for Executing Encrypted Java Programs
TLDR
We present a system that allows encrypting and executing programs written for the Java Virtual Machine (JVM) (Lindholm et al., 2013). Expand
  • 1
  • PDF
Efficient Protection for VDI Workstations
TLDR
We present an application control system that is extremely useful in a VDI environment. Expand
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
TLDR
Memory acquisition is a tool used in advanced forensics and malware analysis. Expand