Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthew Conover is active.

Publication


Featured researches published by Matthew Conover.


recent advances in intrusion detection | 2012

Secure and robust monitoring of virtual machines through guest-assisted introspection

Martim Carbone; Matthew Conover; Bruce Montague; Wenke Lee

Current monitoring solutions for virtual machines do not incorporate both security and robustness. Out-of-guest applications achieve security by using virtual machine introspection and not relying on in-guest components, but do not achieve robustness due to the semantic gap. In-guest applications achieve robustness by utilizing guest OS code for monitoring, but not security, since an attacker can tamper with this code and the application itself. In this paper we propose SYRINGE, a secure and robust infrastructure for monitoring virtual machines. SYRINGE protects the monitoring application by placing it in a separate virtual machine (as with the out-of-guest approach) but at the same time allowing it to invoke guest functions (as with the in-guest approach), using a technique known as function-call injection. SYRINGE verifies the secure execution of the invoked guest OS code by using another technique, localized shepherding. The combination of these two techniques allows SYRINGE to incorporate the best of out-of-guest monitoring with that of in-guest monitoring. We implemented a prototype of SYRINGE as a Linux application to monitor a guest running Windows XP and have evaluated its performance and security. We also implemented a monitoring application built on top of SYRINGE to demonstrate its usefulness. Our results show that for a calling period of 1 second, the performance overhead created in the guest by this application is 8%.


cluster computing and the grid | 2012

Surreptitious Deployment and Execution of Kernel Agents in Windows Guests

Tzi-cker Chiueh; Matthew Conover; Bruce Montague

As more and more virtual machines (VM) are packed into a physical machine, refactoring common kernel components shared by the virtual machines running on the same physical machine significantly reduces the overall resource consumption. A refactored kernel component typically runs on a special VM called a virtual appliance. Because of the semantics gap in Hardware Abstraction Layer (HAL)-based virtualization, a physical machines virtual appliance requires the support of per-VM in-guest agents to perform VM-specific operations such as kernel data structure access and modification. To simplify deployment, these agents must be injected into guest virtual machines without requiring any manual installation. Moreover, it is essential to protect the integrity of in-guest agents at run time, especially when the underlying refactored kernel service is security-related. This paper describes the design, implementation and evaluation of a surreptitious kernel agent deployment and execution mechanism called SADE that requires zero installation effort and effectively hides the execution of agent code. To demonstrate the efficacy of SADE, we describe a signature-based memory scanning virtual appliance that uses SADE to inject its in-guest kernel agents without any support from the injected virtual machine, and show that both the start-up overhead and the run-time performance penalty of SADE are quite modest in practice.


Archive | 2010

Systems and methods for providing network access control in virtual environments

Sanjay Sawhney; Matthew Conover; Bruce Montague


Archive | 2005

Detecting shellcode that modifies IAT entries

Matthew Conover; Sourabh Satish


Archive | 2004

Method and apparatus to detect and recover from a stack frame corruption

Matthew Conover; Sourabh Satish


Archive | 2009

Insertion and invocation of virtual appliance agents through exception handling regions of virtual machines

Tzi-cker Chiueh; Matthew Conover


Archive | 2009

Security driver for hypervisors and operating systems of virtualized datacenters

Bruce Montague; Sanjay Sawhney; Matthew Conover; Tzi-cker Chiueh


Archive | 2013

System and method for logging operations of virtual machines

Matthew Conover


Archive | 2004

Return-to-LIBC attack detection using branch trace records system and method

Matthew Conover; Peter Szor


Archive | 2005

Detection of SYSENTER/SYSCALL hijacking

Peter Szor; Peter Ferrie; Matthew Conover

Collaboration


Dive into the Matthew Conover's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Martim Carbone

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge