Detecting Stealth Software with Strider GhostBuster
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Compatibility is not transparency: VMM detection myths and realities
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.