2006 IEEE Symposium on Security and Privacy (S&P'06) 2006
DOI: 10.1109/sp.2006.38
|View full text |Cite
|
Sign up to set email alerts
|

SubVirt: implementing malware with virtual machines

Abstract: Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection. By assuming this perspective, we hope to help defenders understand and defend against the threat posed by a new class of rootkits.We evaluate a new type of malicious software that gains quali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
157
0
5

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 298 publications
(164 citation statements)
references
References 26 publications
0
157
0
5
Order By: Relevance
“…For example, VMMs mask names and values (i.e., location of the IDT, special processes, communication back doors etc...) or interpose on specific instructions which are used in detection [10]. D2: Detectors search for previously unknown software artifacts.…”
Section: D1mentioning
confidence: 99%
See 4 more Smart Citations
“…For example, VMMs mask names and values (i.e., location of the IDT, special processes, communication back doors etc...) or interpose on specific instructions which are used in detection [10]. D2: Detectors search for previously unknown software artifacts.…”
Section: D1mentioning
confidence: 99%
“…Timing the execution of a Benchmark on M necessitates the existence of a reliable timing source. If M is a virtual machine, the VMM may return timing measurements which do not accurately characterize the execution time [10]. To overcome this complexity, we allow the detector to contact an external timing source.…”
Section: Algorithm Designmentioning
confidence: 99%
See 3 more Smart Citations