Undetectable Monitoring in a Fully-Virtualized Environment - A Continuation of the HAL Keystroke Logger

HICSS(2009)

引用 0|浏览13
暂无评分
摘要
Virtualization is ever an expanding research field and, as many predict, the way of the future for large scale business and server solutions. Originally designed as a method of centralizing physical resources and maintenance, recent research has developed methods of also utilizing virtualization for centralizing machine monitoring. Recently, there have been substantial advances in centralized monitoring in a virtualized environment[1]. Specifically, researchers at the Georgia Tech have developed XenAccess, a system for monitoring memory in a paravirtualized environment [2]. This paper highlights the differences between two popular virtualization methods, paravirtualization and full-system virtualization. A comparison between techniques used by XenAccess to those implemented in our undetectable Hardware Abstraction Layer (HAL) Keystroke Logger is then presented before expanding the original HAL template and finally discussing in detail methods to monitor disk access and memory management.
更多
查看译文
关键词
recent research,memory management,utilizing virtualization,monitoring,storage management,centralizing machine monitoring,hardware abstraction layer,virtual machines,operating systems (computers),centralized monitoring,hal keystroke logger,xenaccess,paravirtualized environment,full-system virtualization,popular virtualization method,research field,fully-virtualized environment,disk access,undetectable monitoring,original hal template,system monitoring,virtual environment
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要