Encyclopedia of Criminal Activities and the Deep Web 2020
DOI: 10.4018/978-1-5225-9715-5.ch078
|View full text |Cite
|
Sign up to set email alerts
|

Modern Blue Pills and Red Pills

Abstract: This article presents the concept of blue pill, a stealth hypervisor-based rootkit, that was introduced by Joanna Rutkowska in 2006. The blue pill is a malicious thin hypervisor-based rootkit that takes control of the victim machine. Furthermore, as the blue pill does not run under the operating system context, the blue pill is very difficult to detect easily. The red pill is the competing concept (i.e., a forensics software that runs on the inspected machine and detects the existence of malicious hypervisor o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…However, this approach can be easily bypassed by disabling the acceleration option of guest machines. These limitations are unsuitable for detecting virtual machines [8], [31].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this approach can be easily bypassed by disabling the acceleration option of guest machines. These limitations are unsuitable for detecting virtual machines [8], [31].…”
Section: Introductionmentioning
confidence: 99%
“…However, there are limitations in detecting APIs that can reduce detection accuracy or instructions that are not valid in modern environments. [8].…”
Section: Introductionmentioning
confidence: 99%