Automatic Mitigation of Kernel Rootkits in Cloud Environments


In cloud environments, the typical response to a malware attack is to snapshot and shutdown the virtual machine (VM), and revert it to a prior state. This approach often leads to service disruption and loss of availability, which can have much more damaging consequences than the original attack. Critical evidence needed to understand and permanently remedy… (More)

3 Figures and Tables


  • Presentations referencing similar topics