• DocumentCode
    892896
  • Title

    Hiding Virtualization from Attackers and Malware

  • Author

    Carpenter, Matthew ; Liston, Tom ; Skoudis, Ed

  • Volume
    5
  • Issue
    3
  • fYear
    2007
  • Firstpage
    62
  • Lastpage
    65
  • Abstract
    Virtual machine environments (VMEs) let a user or administrator run one or more guest operating systems on top of a host operating system. With security researchers relying on VMEs in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virtual machine. This article focuses on detection techniques and mitigation options for the most widely deployed VME product today, VMware.
  • Keywords
    operating systems (computers); security of data; virtual machines; VME detection techniques; VMware product; malicious code attacker; malware; operating system; virtual machine environment; Communication channels; Computer security; Data security; Graphical user interfaces; Hardware; Operating systems; Privacy; Protocols; Registers; Virtual manufacturing; honey pots; malware; virtual; virtualization;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2007.63
  • Filename
    4218554