DocumentCode
892896
Title
Hiding Virtualization from Attackers and Malware
Author
Carpenter, Matthew ; Liston, Tom ; Skoudis, Ed
Volume
5
Issue
3
fYear
2007
Firstpage
62
Lastpage
65
Abstract
Virtual machine environments (VMEs) let a user or administrator run one or more guest operating systems on top of a host operating system. With security researchers relying on VMEs in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virtual machine. This article focuses on detection techniques and mitigation options for the most widely deployed VME product today, VMware.
Keywords
operating systems (computers); security of data; virtual machines; VME detection techniques; VMware product; malicious code attacker; malware; operating system; virtual machine environment; Communication channels; Computer security; Data security; Graphical user interfaces; Hardware; Operating systems; Privacy; Protocols; Registers; Virtual manufacturing; honey pots; malware; virtual; virtualization;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2007.63
Filename
4218554
Link To Document