2020
DOI: 10.1007/978-3-030-49443-8_15
|View full text |Cite
|
Sign up to set email alerts
|

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Thus, the infrastructure of Linux kernels would enhance the possibility for counterattacking the external or internal impregnation attempts at each entity at system level. • Hypervisor introspection: Hypervisor introspection [121] could be used at system level for detecting anomalous behavior.…”
Section: ) C6: 5g Core Networkmentioning
confidence: 99%
“…Thus, the infrastructure of Linux kernels would enhance the possibility for counterattacking the external or internal impregnation attempts at each entity at system level. • Hypervisor introspection: Hypervisor introspection [121] could be used at system level for detecting anomalous behavior.…”
Section: ) C6: 5g Core Networkmentioning
confidence: 99%
“…In the past we have shown how hypervisors can be used to obtain memory contents (Ben Yehuda et al 2021) for forensics analysis and also create honeypots (Zaidenberg et al 2020) that encourage malware to expose themselves.…”
Section: Introductionmentioning
confidence: 99%