2015 9th International Conference on Application of Information and Communication Technologies (AICT) 2015
DOI: 10.1109/icaict.2015.7338541
|View full text |Cite
|
Sign up to set email alerts
|

Malicious hypervisor and hidden virtualization of operation systems

Abstract: Today virtualization technology is the focus of many new potential threats and introduces new security challenges that we must meet. The key problem is that malware can utilize the virtualization techniques of modern CPUs for "hidden virtualization" (invisible for user): to execute as a hypervisor and transform the working operation system (OS) into a "guest" state. In this work we analyzed and compared the functionality of several research virtual machine monitors (VMMs: BluePill, SubVirt, BitVisor) which can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Malware authors have long realized the potential of hypervisors. For example, a malicious hypervisor can be installed to trap the operating system in a virtual machine (VM) and take away its root privileges [29]; in this way, the malicious hypervisor gains superiority over the kernel, effectively giving it control of the operating system. Any analysis tool installed on the OS will be unaware of code executed by the hypervisor.…”
Section: Classification Of Malware By Privilegementioning
confidence: 99%
See 1 more Smart Citation
“…Malware authors have long realized the potential of hypervisors. For example, a malicious hypervisor can be installed to trap the operating system in a virtual machine (VM) and take away its root privileges [29]; in this way, the malicious hypervisor gains superiority over the kernel, effectively giving it control of the operating system. Any analysis tool installed on the OS will be unaware of code executed by the hypervisor.…”
Section: Classification Of Malware By Privilegementioning
confidence: 99%
“…The Windows registry can be used for this purpose, but other techniques are also used, including: shortcut modifications, DLL search order hijacking, subverting the boot process and loading a malicious kernel (such malware is called a bootkit [46,47]), hardware infection, and others. 29 One method malware use to gain persistency is by adding itself to an Auto-Start Extendibility Point (ASEP), 30 such as the registry startup key in Windows. For example, adding a malicious command to the Run or RunOnce registry keys will cause the computer to execute that command when the system has finished the booting process.…”
Section: Supporting Operationsmentioning
confidence: 99%
“…Malware authors have long realized the potential of hypervisors. For example, a malicious hypervisor can be installed to trap the operating system in a virtual machine (VM) and take away its root privileges [29]; in this way, the malicious hypervisor gains superiority over the kernel, effectively giving it control of the operating system. Any analysis tool installed on the OS will be unaware of code executed by the hypervisor.…”
Section: Classification Of Malware By Privilegementioning
confidence: 99%
“…The Windows registry can be used for this purpose, but other techniques are also used, including: shortcut modifications, DLL search order hijacking, subverting the boot process and loading a malicious kernel (such malware is called a bootkit [46,47]), hardware infection, and others. 29 One method malware use to gain persistency is by adding itself to an Auto-Start Extendibility Point (ASEP), 30 such as the registry startup key in Windows. For example, adding a malicious command to the Run or RunOnce registry keys will cause the computer to execute that command when the system has finished the booting process.…”
Section: Supporting Operationsmentioning
confidence: 99%