Hiding Virtualization from Attackers and Malware

  • Authors:
  • Matthew Carpenter;Tom Liston;Ed Skoudis

  • Affiliations:
  • Intelguardians;Intelguardians;Intelguardians

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

With security researchers relying on virtual machine environments (VMEs) in their analysis work, attackers and their malicious code have a significant stake in detecting the presence of a virtual machine. Virtualization, by its very nature, creates systems that have different characteristics from real machines. From a theoretical perspective, any difference between the virtual and the real could lead to a fingerprinting opportunity for attackers. This article focuses on detection techniques and mitigation options for the most widely deployed VME product today, VMware.