Characterizing hypervisor vulnerabilities in cloud computing servers

@inproceedings{PerezBotero2013CharacterizingHV,
  title={Characterizing hypervisor vulnerabilities in cloud computing servers},
  author={Diego Perez-Botero and Jakub Szefer and Ruby B. Lee},
  booktitle={SCC@ASIACCS},
  year={2013}
}
The rise of the Cloud Computing paradigm has led to security concerns, taking into account that resources are shared and mediated by a Hypervisor which may be targeted by rogue guest VMs and remote attackers. In order to better define the threats to which a cloud server's Hypervisor is exposed, we conducted a thorough analysis of the codebase of two popular open-source Hypervisors, Xen and KVM, followed by an extensive study of the vulnerability reports associated with them. Based on our… CONTINUE READING
Highly Cited
This paper has 118 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 74 extracted citations

Classifying malware attacks in IaaS cloud environments

Journal of Cloud Computing • 2017
View 11 Excerpts
Highly Influenced

Security issues in cloud environments: a survey

International Journal of Information Security • 2013
View 4 Excerpts
Highly Influenced

Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications

IEEE Transactions on Dependable and Secure Computing • 2018
View 1 Excerpt

From Database to Cyber Security

Lecture Notes in Computer Science • 2018

118 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 118 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Preventing and detecting xen hypervisor subversions

J. Rutkowska, R. Wojtczuk
2008
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…