2018
DOI: 10.1007/978-3-030-03638-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…First, when tracing a process using VMI, e.g. to operate highinteraction honeypots [23], the VMI application has to translate the logical address where it wants to place a breakpoint to a physical memory page in which the instruction is injected. This target page may be part of multiple virtual address spaces, because it belongs either to a shared library, to an intentionally shared memory area, or to memory marked read-only (and duplicated later with a copyon-write strategy) after a fork system call.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…First, when tracing a process using VMI, e.g. to operate highinteraction honeypots [23], the VMI application has to translate the logical address where it wants to place a breakpoint to a physical memory page in which the instruction is injected. This target page may be part of multiple virtual address spaces, because it belongs either to a shared library, to an intentionally shared memory area, or to memory marked read-only (and duplicated later with a copyon-write strategy) after a fork system call.…”
Section: Introductionmentioning
confidence: 99%
“…Since this register is the page table base register (PTBR) in the x86 architecture, it must hold the currently active page table. By exiting on writes to this register, we can synchronize the VMI application with the guest's scheduler [23]. As this control register may only be updated in kernel mode, we can extract further information such as the current scheduler state from the kernel.…”
Section: Active Virtual Machine Introspectionmentioning
confidence: 99%