Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the new statistical analysis of time discrepancies by examination of a set of instructions, which ar...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
We are discussing processor modes switching schemes and analyzing processor instructions execution i...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Hardware virtualization technologies play a significant role in cyber security. On the one hand, the...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Hypervisor detection is a pillar of sandbox evasion techniques. While hardware-assisted virtualizati...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtualization technology is nowadays adopted in security-critical embedded systems to achieve highe...
Virtual machine introspection (VMI) is intended to provide a secure and trusted platform from which ...
Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory s...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware ...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
We are discussing processor modes switching schemes and analyzing processor instructions execution i...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Hardware virtualization technologies play a significant role in cyber security. On the one hand, the...
Hardware virtualization technologies play a significant role in cyber security. On the one hand thes...
Hypervisor detection is a pillar of sandbox evasion techniques. While hardware-assisted virtualizati...
With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
Virtualization technology is nowadays adopted in security-critical embedded systems to achieve highe...
Virtual machine introspection (VMI) is intended to provide a secure and trusted platform from which ...
Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory s...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware ...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
We are discussing processor modes switching schemes and analyzing processor instructions execution i...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...