(2012). Qos-monaas: A portable architecture for qos
monitoring in the cloud. SITIS ’12, pages 527–532.
Bernsmed, K., Jaatun, M. G., Meland, P. H., and Undheim,
A. (2011). Security slas for federated cloud services.
ARES ’11, pages 202–209.
Chen, X., Garfinkel, T., Lewis, E. C., Subrahmanyam, P.,
Waldspurger, C. A., Boneh, D., Dwoskin, J., and
Ports, D. R. (2008). Overshadow: A virtualization-
based approach to retrofitting protection in commod-
ity operating systems. SIGOPS Oper. Syst. Rev.,
42(2):2–13.
Chow, J., Garfinkel, T., and Chen, P. M. (2008). Decoupling
dynamic program analysis from execution in virtual
environments. ATC ’08, pages 1–14.
de Chaves, S., Westphall, C., and Lamin, F. (2010). Sla per-
spective in security management for cloud computing.
ICNS ’10, pages 212–217.
Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A.,
and Chen, P. M. (2002). Revirt: Enabling intrusion
analysis through virtual-machine logging and replay.
SIGOPS Oper. Syst. Rev., 36(SI):211–224.
Emeakaroha, V., Brandic, I., Maurer, M., and Dustdar, S.
(2010). Low level metrics to high level slas - lom2his
framework: Bridging the gap between monitored met-
rics and sla parameters in cloud environments. HPCS
’10, pages 48–54.
Emeakaroha, V., Ferreto, T., Netto, M., Brandic, I., and
De Rose, C. (2012). Casvid: Application level mon-
itoring for sla violation detection in clouds. COMP-
SAC ’12, pages 499–508.
Garfinkel, T. and Rosenblum, M. (2003). A virtual machine
introspection based architecture for intrusion detec-
tion. NDSS’03, pages 191–206.
Hogben, G. and Dekker, M. (2012). Procure secure. a guide
to monitoring of security service levels in cloud con-
tracts. Technical report, European Network and Infor-
mation Security Agency (ENISA).
Ibrahim, A., Hamlyn-Harris, J., Grundy, J., and Almorsy,
M. (2011). Cloudsec: A security monitoring appliance
for virtual machines in the iaas cloud model. NSS ’11,
pages 113–120.
Jiang, X., Wang, X., and Xu, D. (2007). Stealthy mal-
ware detection through vmm-based ”out-of-the-box”
semantic view reconstruction. CCS ’07, pages 128–
138.
Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau,
R. H. (2008). Vmm-based hidden process detection
and identification using lycosid. VEE ’08, pages 91–
100.
Lanzi, A., Sharif, M. I., and Lee, W. (2009). K-tracer:
A system for extracting kernel malware behavior.
NDSS’09.
Lombardi, F. and Di Pietro, R. (2009). Kvmsec: A security
extension for linux kernel virtual machines. SAC ’09,
pages 2029–2034.
McCune, J., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor,
V., and Perrig, A. (2010). Trustvisor: Efficient tcb
reduction and attestation. SP ’10, pages 143–158.
Nguyen, A., Schear, N., Jung, H., Godiyal, A., King, S.,
and Nguyen, H. (2009). Mavmm: Lightweight and
purpose built vmm for malware analysis. ACSAC ’09,
pages 441–450.
Pannetrat, A., Hogben, G., Katopodis, S., Spanoudakis, G.,
and Cazorla, C. S. (2013). D2.1: Security-aware sla
specification language and cloud security dependency
model. Technical report, Certification infrastrUcture
for MUlti-Layer cloUd Services (CUMULUS).
Payne, B., Carbone, M., Sharif, M., and Lee, W. (2008).
Lares: An architecture for secure active monitoring
using virtualization. SP ’08, pages 233–247.
Petcu, D., Di Martino, B., Venticinque, S., Rak, M., M´ahr,
T., Esnal Lopez, G., Brito, F., Cossu, R., Stopar, M.,
ˇ
Sperka, S., and Stankovski, V. Experiences in build-
ing a mosaic of clouds. Journal of Cloud Computing:
Advances, Systems and Applications, 2:12.
Rak, M., Luna, J., Petcu, D., Casola, V., Suri, N., and Vil-
lano, U. (2013). Security as a service using an sla-
based approach via specs. CloudCom ’ 13.
Rak, M., Venticinque, S., M´ahr, T., Echevarria, G., and Es-
nal, G. (2011). Cloud application monitoring: The
mosaic approach. CloudCom ’11, pages 758–763.
Riley, R., Jiang, X., and Xu, D. (2008). Guest-transparent
prevention of kernel rootkits with vmm-based mem-
ory shadowing. RAID ’08, pages 1–20.
Riley, R., Jiang, X., and Xu, D. (2009). Multi-aspect pro-
filing of kernel rootkit behavior. EuroSys ’09, pages
47–60.
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). Secvi-
sor: A tiny hypervisor to provide lifetime kernel code
integrity for commodity oses. SOSP ’07, pages 335–
350.
Sharif, M. I., Lee, W., Cui, W., and Lanzi, A. (2009). Secure
in-vm monitoring using hardware virtualization. CCS
’09, pages 477–487.
Shin, S. and Gu, G. (2012). Cloudwatcher: Network secu-
rity monitoring using openflow in dynamic cloud net-
works (or: How to provide security monitoring as a
service in clouds?). ICNP ’12, pages 1–6.
Smit, M., Simmons, B., and Litoiu, M. (2013). Distributed,
application-level monitoring for heterogeneous clouds
using stream processing. Future Generation Com-
puter Systems, 29(8):2103–2114.
Szefer, J. M. (2013). Architectures for Secure Cloud Com-
puting Servers. PhD thesis, University of Princeton.
Wagner, R., Heiser, J., Perkins, E., Nicolett, M., Kavanagh,
K. M., Chuvakin, A., and Young, G. (2012). Predicts
2013: Cloud and services security. Technical report,
Gartner ID:G00245775.
Wu, X., Gao, Y., Tian, X., Song, Y., Guo, B., Feng, B.,
and Sun, Y. (2013). Secmon: A secure introspec-
tion framework for hardware virtualization. PDP ’13,
pages 282–286.
Xuan, C., Copeland, J., and Beyah, R. (2009). Toward re-
vealing kernel malware behavior in virtual execution
environments. RAID ’09, pages 304–325.
Zou, D., Zhang, W., Qiang, W., Xiang, G., Yang, L. T., Jin,
H., and Hu, K. (2013). Design and implementation of
a trusted monitoring framework for cloud platforms.
Future Generation Computer Systems, 29(8):2092 –
2102.
TowardsaSecuritySLA-basedCloudMonitoringService
603