• Publications
  • Influence
A Virtual Machine Introspection Based Architecture for Intrusion Detection
TLDR
In this paper we present an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance. Expand
  • 1,421
  • 144
  • PDF
Terra: a virtual machine-based platform for trusted computing
TLDR
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware, while retaining the ability to run side-by-side with normal applications on a general-purpose computing platform. Expand
  • 1,107
  • 51
  • PDF
Virtual machine monitors: current technology and future trends
TLDR
Developed more than 30 years ago to address mainframe computing problems, virtual machine monitors have resurfaced on commodity platforms, offering novel solutions to challenges in security, reliability, and administration. Expand
  • 674
  • 33
  • PDF
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
TLDR
We introduce a virtual-machine-based system called Overshadow that protects the privacy and integrity of application data, even in the event of a total OScompromise. Expand
  • 413
  • 32
  • PDF
Understanding data lifetime via whole system simulation
TLDR
We describe a system we have developed for analyzing sensitive data lifetime through whole system simulation called TaintBochs. Expand
  • 350
  • 21
  • PDF
VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments
TLDR
Analyzing the behavior of running programs has a wide variety of compelling applications, from intrusion detection and prevention to bug discovery. Expand
  • 184
  • 17
  • PDF
When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments
TLDR
We examine a variety of security problems virtual computing environments give rise to, and propose ways to address them. Expand
  • 312
  • 15
  • PDF
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
TLDR
We present some of the problems and pitfalls we encountered, including incorrectly replicating OS semantics, overlooking indirect paths to resources, race conditions, incorrectly subsetting a complex interface and side effects of denying system calls. Expand
  • 245
  • 15
  • PDF
Reducing shoulder-surfing by using gaze-based password entry
TLDR
We present EyePassword, a system that mitigates the issues of shoulder surfing via a novel approach to user input using only the orientation of their pupils, making eavesdropping by a malicious observer largely impractical. Expand
  • 301
  • 12
  • PDF
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
TLDR
We present a strategy for reducing the lifetime of data in memory with minimal implementation effort, negligible overhead, and without modifying existing applications. Expand
  • 169
  • 10
  • PDF