Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/6622
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, A.V. | - |
dc.contributor.author | Vishnani, K. | - |
dc.contributor.author | Kumar, K.V. | - |
dc.date.accessioned | 2020-03-30T09:45:55Z | - |
dc.date.available | 2020-03-30T09:45:55Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Proceedings of the 5th International Conference on Security of Information and Networks, SIN'12, 2012, Vol., , pp.20-26 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/6622 | - |
dc.description.abstract | Virtual Machines have gained immense popularity amongst the Security Researchers and Malware Analysts due to their pertinent design to analyze malware without risking permanent infection to the actual system carrying out the tests. This is because during analysis, even if a malware infects and destabilizes the guest OS, the analyst can simply load in a fresh image thus avoiding any damage to the actual machine. However, the cat and mouse game between the Black Hat and the White Hat Hackers is a well established fact. Hence, the malware writers have once again raised their stakes by creating a new kind of malware which can detect the presence of virtual machines. Once it detects that it is running on a virtual machine, it either terminates execution immediately or simply hides its malicious intent and continues to execute in a benign manner thus evading its own detection. This category of malware has been termed as Split Personality malware or Analysis Aware malware in the Information Security jargon. This paper aims at defeating the split personality malware in popular virtual machine environment. This work includes first the study of various virtual machine detection techniques and then development of a method to thwart these techniques from successfully detecting the virtual machines-VirtualBox, VirtualPC and VMware. Copyright � 2012 ACM. | en_US |
dc.title | Split personality malware detection and defeating in popular virtual machines | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.