DocumentCode :
595560
Title :
Circumventing cryptography in virtualized environments
Author :
Hay, Brian ; Nance, K.
Author_Institution :
Security Works, USA
fYear :
2012
fDate :
16-18 Oct. 2012
Firstpage :
32
Lastpage :
38
Abstract :
The use of cryptography is becoming increasingly prevalent, and we see it in more and more contexts -on both sides of the fence. It is used to protect data from unauthorized access, but is also being used by adversaries - often for botnet C&C, manual control of compromised hosts, and data exfiltration. Virtual Machine Introspection (VMI) provides a mechanism by which the state of a virtual machine can be examined in real time (or near real time) from a vantage point external to the VM being monitored (e.g., the hypervisor or some other VM it delegates VMI capability to). This paper describes the results of a DARPA Cyber Fast Track project to develop a method that provides a hypervisor owner (e.g., government or corporate enterprise, a cloud provider, or honeynet operator) with the ability to recover and inspect the plaintext of encrypted data and communication channels within virtual machines.
Keywords :
cryptography; virtual machines; DARPA Cyber Fast Track project; VMI; botnet C&C; communication channels; compromised host manual control; cryptography circumventing; data exfiltration; data protection; encrypted data plaintext; hypervisor owner; virtual machine introspection; virtualized environments; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4673-4880-5
Type :
conf
DOI :
10.1109/MALWARE.2012.6461005
Filename :
6461005
Link To Document :
بازگشت