Benjamin Taubmann

According to our database1, Benjamin Taubmann authored at least 22 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Towards GDPR-compliant data processing in modern SIEM systems.
Comput. Secur., 2021

Introspect Virtual Machines Like It Is the Linux Kernel!
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

RapidVMI: Fast and multi-core aware active virtual machine introspection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Improving Digital Forensics and Incident Analysis in Production Environments by Using Virtual Machine Introspection.
PhD thesis, 2020

Agent-Based File Extraction Using Virtual Machine Introspection.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection.
Proceedings of the Distributed Applications and Interoperable Systems, 2020

2019
TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines.
Proceedings of the 18th IEEE International Conference On Trust, 2019

VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection.
Proceedings of the Secure IT Systems, 2019

2018
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps.
Digit. Investig., 2018

Introducing DINGfest: An architecture for next generation SIEM systems.
Proceedings of the Sicherheit 2018, 2018

Introspection for ARM TrustZone with the ITZ Library.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Classifying malware attacks in IaaS cloud environments.
J. Cloud Comput., 2017

Architecture for Resource-Aware VMI-based Cloud Malware Analysis.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

Virtual Machine Introspection Based SSH Honeypot.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

2016
A flexible framework for mobile device forensics based on cold boot attacks.
EURASIP J. Inf. Secur., 2016

TLSkex: Harnessing virtual machine introspection for decrypting TLS communication.
Digit. Investig., 2016

CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Geographic Localization of an Anonymous Social Network Message Data Set.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2012
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Proceedings of the Applied Cryptography and Network Security, 2012


  Loading...