DocumentCode :
892896
Title :
Hiding Virtualization from Attackers and Malware
Author :
Carpenter, Matthew ; Liston, Tom ; Skoudis, Ed
Volume :
5
Issue :
3
fYear :
2007
Firstpage :
62
Lastpage :
65
Abstract :
Virtual machine environments (VMEs) let a user or administrator run one or more guest operating systems on top of a host operating system. With security researchers relying on VMEs in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virtual machine. This article focuses on detection techniques and mitigation options for the most widely deployed VME product today, VMware.
Keywords :
operating systems (computers); security of data; virtual machines; VME detection techniques; VMware product; malicious code attacker; malware; operating system; virtual machine environment; Communication channels; Computer security; Data security; Graphical user interfaces; Hardware; Operating systems; Privacy; Protocols; Registers; Virtual manufacturing; honey pots; malware; virtual; virtualization;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2007.63
Filename :
4218554
Link To Document :
بازگشت