2013 IEEE Conference on Communications and Network Security (CNS) 2013
DOI: 10.1109/cns.2013.6682767
|View full text |Cite
|
Sign up to set email alerts
|

Rootkit detection on virtual machines through deep information extraction at hypervisor-level

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Memory forensic analysis relies on memory images, such as VM (Virtual Machine) images, to deduce the potential existence of malicious software or applications [12,13]. While certain techniques aim to reduce the number of memory checks required, this approach fundamentally differs from our proposal.…”
Section: Related Workmentioning
confidence: 98%
“…Memory forensic analysis relies on memory images, such as VM (Virtual Machine) images, to deduce the potential existence of malicious software or applications [12,13]. While certain techniques aim to reduce the number of memory checks required, this approach fundamentally differs from our proposal.…”
Section: Related Workmentioning
confidence: 98%
“…Similar to our work, Forensic VMs [33] rely on VMI to analyze VMs for attacks, but they cannot provide automated post attack analysis or the zero window of vulnerability guarantees oered by CRIMES. Other approaches to providing security in the hypervisor include virus scanning [28], root kit detection [39], etc. Such systems could be incorporated into CRIMES as detection modules, granting them the ability to not only detect attacks, but perform additional analysis afterwards.…”
Section: Related Workmentioning
confidence: 99%