Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.
Stefano CristalliMattia PagnozziMariano GrazianoAndrea LanziDavide BalzarottiPublished in: USENIX Security Symposium (2016)
Keyphrases
- operating system
- cloud computing
- automatic detection
- network attacks
- storage devices
- detection algorithm
- detection method
- data corruption
- memory requirements
- countermeasures
- distributed denial of service attacks
- malicious attacks
- neural network
- security mechanisms
- watermarking scheme
- detect malicious
- main memory
- malicious users
- sql injection
- memory space
- normal behavior
- storage management
- cryptographic protocols
- security protocols
- limited memory
- computer security
- high availability
- virtual machine
- intrusion detection
- data structure