International audienceVirtualisation and emulation technologies are increasingly used for malware analysis. However this is not what they were developed for and as a result, new problems arise. This presentation will introduce the different kinds of virtualisation technologies, the problem they try to solve for malware analysts (real-time behavior monitoring) and the currently emerging problems (virtual machine detection and logic bombs). The conclusion of this survey is that perfect monitoring and undetectability are reachable goals for virtual machines, but the detection of logic bombs is intractable. As a result, virtual machines are a handy tool for malware analysts but undetectable real-time monitoring techniques should be developed in...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Coping with malware is getting more and more challenging, given their relentless growth in complexit...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
Abstract—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
In this thesis, two types of Cuckoo, a malware analysis software, were compared in two different vir...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
ABSTRACT Reverse engineering is commonly used by the malware analysts to detect the runtime activiti...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
The growing complexity of modern malware drives security applications to leverage virtual machine in...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Due to the increasing threat from malicious software (malware), monitoring of vulnerable systems is ...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Coping with malware is getting more and more challenging, given their relentless growth in complexit...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
Abstract—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
In this thesis, two types of Cuckoo, a malware analysis software, were compared in two different vir...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
ABSTRACT Reverse engineering is commonly used by the malware analysts to detect the runtime activiti...
A transparent and extensible malware analysis platform is essen-tial for defeating malware. This pla...
The growing complexity of modern malware drives security applications to leverage virtual machine in...
Malware detection and analysis is a major part of computer security. There is an arm race between se...
Due to the increasing threat from malicious software (malware), monitoring of vulnerable systems is ...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Coping with malware is getting more and more challenging, given their relentless growth in complexit...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...