Skip to main content

Showing 1–1 of 1 results for author: Gurjar, T

  1. arXiv:2211.02266  [pdf, other

    cs.CR cs.OS

    Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques

    Authors: Vinayak Trivedi, Tushar Gurjar, Sumaiya Shaikh, Saketh Maddamsetty, Debadatta Mishra

    Abstract: In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicious applications or exploiting existing software vulnerabilities through security non-conforming actions of users. Virtualization approaches can address this problem by providing a quarantine environment for applications, malicious devices, and device drivers, which are mostly used as entry points fo… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: 14 pages, 9 figures