Title :
Hiding Virtualization from Attackers and Malware
Author :
Carpenter, Matthew ; Liston, Tom ; Skoudis, Ed
Abstract :
Virtual machine environments (VMEs) let a user or administrator run one or more guest operating systems on top of a host operating system. With security researchers relying on VMEs in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virtual machine. This article focuses on detection techniques and mitigation options for the most widely deployed VME product today, VMware.
Keywords :
operating systems (computers); security of data; virtual machines; VME detection techniques; VMware product; malicious code attacker; malware; operating system; virtual machine environment; Communication channels; Computer security; Data security; Graphical user interfaces; Hardware; Operating systems; Privacy; Protocols; Registers; Virtual manufacturing; honey pots; malware; virtual; virtualization;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2007.63