Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2014
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.52 KB | None | 0 0
  1. \begin{table*}[ht]
  2. \begin{tabu} to 1\textwidth {X[l] X[l]}
  3. \hline
  4. \bf Assumptions of existing work & \bf Points of failure in a cloud environment\\
  5. \hline
  6. System is monitored continuously from power-on and throughout its lifecycle & VMs can be created, cloned, reverted to snapshots and migrated arbitrarily
  7. throughout their lifetime. \\
  8. \hline
  9. Guest system is clean when it starts being monitored & VMs can come into existence already infected or compromised.\\
  10. \hline
  11. Guest system can be modified on the fly to insert
  12. hooks or other monitoring mechanisms & Some customized systems may not be able to be modified, or we may not have
  13. the knowledge necessary to do the modifications. \\
  14. \hline
  15. Guest OS is known in advance & VMs may be configured with any one or more guest OSes (e.g., multi-boot VMs). \\
  16. \hline
  17. Guest OS source code is available & Most real-world attacks (e.g. rootkits) operate on Windows. \\
  18. \hline
  19. Guest OS information (e.g. location of data structures)
  20. is available & The location of internal data structures is unknown when no source code and no
  21. version information are available. \\
  22. \hline
  23. Malware is known in advance and given as blacklists & New malware is created constantly, realistic protection cannot rely on blacklists. \\
  24. \hline
  25. Trusted boot process exists & Not all h/w platforms, hypervisors, and OSes support trusted boot. \\
  26. \hline
  27. \end{tabu}
  28. \captionof{table}{ \bf Assumptions made by existing kernel integrity-checking mechanisms}
  29. \captionsetup[table]{textfont={bf,large}}
  30. \end{table*}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement