2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.48
|View full text |Cite
|
Sign up to set email alerts
|

MAVMM: Lightweight and Purpose Built VMM for Malware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(28 citation statements)
references
References 12 publications
0
24
0
2
Order By: Relevance
“…Behavior-based detection is effective to defeat the obfuscation techniques; however, its extracting subsystem is too complicated to deploy. In addition, this method belongs to dynamic detection type so it itself has the natural problems of a monitoring system [3]. For instance, the silent malware is used VMM (Virtual Machine Monitor) detection techniques: IDT check, LDT check, MCW check or Virtual PC Special Instruction [3] to detect its executing environment that is whether virtual or not and then automatically changes to the appropriate behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Behavior-based detection is effective to defeat the obfuscation techniques; however, its extracting subsystem is too complicated to deploy. In addition, this method belongs to dynamic detection type so it itself has the natural problems of a monitoring system [3]. For instance, the silent malware is used VMM (Virtual Machine Monitor) detection techniques: IDT check, LDT check, MCW check or Virtual PC Special Instruction [3] to detect its executing environment that is whether virtual or not and then automatically changes to the appropriate behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Onoe et al present a method to filter system calls based on security policies [16]. MAVMM, a custom, lightweight VMM designed for malware detection [15] also utilizes system call interception. Ether [6] uses the same interception mechanism, but focuses on keeping its presence undetectable by malware.…”
Section: Related Workmentioning
confidence: 99%
“…Some have shown that the VMM can infer a great deal of information about the guest (both the applications and the kernel) through indirect means [8,7]. These techniques have particularly useful applications in security, where trust can be placed in the VMM to detect attacks and malicious processes [5,9,18,15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On one hand, virtual machines (VMs) help improve security in the cloud computing infrastructure through greater isolation and more transparent malware analysis and intrusion detection (e.g. Nguyen et al (2009); Oliveira and Wu (2009) ;Riley et al (2008); Dinaburg et al (2008); Dunlap et al (2002); Garfinkel and Rosenblum (2003); Joshi et al (2005); Seshadri et al (2007); Payne et al (2008); Kourai and Chiba (2005)). On the other hand, virtualization also gives rise to new challenges in maintaining security and privacy in cloud computing infrastructures.…”
Section: Introductionmentioning
confidence: 99%