enter search term and/or author name
Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often...
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows
Yueqiang Cheng, Xuhua Ding, Robert H. Deng
Article No.: 6
Most commodity peripheral devices and their drivers are geared to achieve high performance with security functions being opted out. The absence of strong security measures invites attacks on the I/O data and consequently posts threats to those...
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu, Zhiqiang Lin
Article No.: 7
It is generally believed to be a tedious, time-consuming, and error-prone process to develop a virtual machine introspection (VMI) tool because of the semantic gap. Recent advance shows that the semantic-gap can be largely narrowed by reusing the...
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
Abdul Serwadda, Vir V. Phoha
Article No.: 8
Research on keystroke-based authentication has traditionally assumed human impostors who generate forgeries by physically typing on the keyboard. With bots now well understood to have the capacity to originate precisely timed keystroke sequences,...