期刊文献+

一种恶意软件分析中检测虚拟环境的方法 被引量:4

A method to detect the presence of virtual environment in the analysis of malware
下载PDF
导出
摘要 安全厂商普遍使用虚拟环境来分析恶意软件,但是很多恶意软件都使用了检测虚拟机的技术来对抗对其的分析。文章介绍了3种主要的检测虚拟环境方法,给出了相应的对抗措施来防止对虚拟环境的检测。设计了一种新的基于性能比较的检查虚拟机和模拟器的方法,实验结果表明,该方法能够有效地检测出虚拟机和模拟器,如VMware软件和模拟器Qemu。 Security Companies usually apply virtual environment to analyze malware,whereas a large amount of current malware already adopts various VMware detection techniques in order to resist analysis.In this paper,three main methods for detecting the presence of virtual environment are presented,as well as their countermeasures.A performance related method to detect the presence of virtual machine or emulator is designed,which can successfully detect the presence of virtual environment,such as VMware and Qemu,etc.
出处 《信息与电子工程》 2010年第3期364-367,共4页 information and electronic engineering
关键词 木马分析 虚拟机 模拟器 虚拟环境 malware analysis virtual machine monitor emulator virtual environment
  • 相关文献

参考文献11

  • 1David Yu Zhu,Erika Chin. Detection of VM-Aware Malware[EB/OL]. (2007-12-11)[2009-10-20]. http://radlab.es.berkeley. edu/w/uploads/3/3 d/Detecting_VM_Aware_Malware.pdf.
  • 2Ulrich Bayer. TTAnalyze:A Tool for Analyzing Malware[D]. Vienna:Information Systems Institute and at the Institute of Computer Aided Automation Technical University of Vienna, 2005.
  • 3Zknk Den. Detecting Vmwares Remotely[EB/OL]. [2009-10-20]. http://www.secniche.org/papers/Detecting_Vmwares Remotely.pdf.
  • 4Tobias Klein. Scoopy doo Vmware fingerprint suite[EB/OL]. (2003)[2009-10-20]. http://www.trapkit.de/research/vmm/scoopydoo/ index.html.
  • 5Rutkowska Joanna. Red Pill…or how to detect VMM using (almost) one CPU instruction[EB/OL]. (2004-11)[2009-10-20]. http://invisiblethin gs .org/papers/redpill .html.
  • 6Danny Quist,Val Smith. Detecting the presence of virtual machines using the local data Table[EB/OL]. (2005)[2009-10-20]. http://www. offensivecomputing.net/dc 14/vm.pdf.
  • 7Elias Aka Lallous. Detect if your program is running inside a virtual machine[EB/OL]. (2005-04-04)[2009-10-20]. http:// http://www.codeproject.com/KB/system/VmDetect.aspx.
  • 8Li Sun,Tim Ebringer,Serdar Boztas. An automatic anti-anti-VMware technique applicable for multi-stage packed malware[C]// 3rd International Conference on Malicious and Unwanted Software(Malware'08). Washington,DC,USA:IEEE Computer Society, 2008:17-23.
  • 9Matthew Carpenter,Tom Liston,Ed Sloudis. Hiding virtualization from attackers and malware[J]. IEEE Security & Privacy, 2007,5(3):62-65.
  • 10Popek G J,Goldberg R P. Formal requirements for virtualizable third generation Architectures[J]. Communications of the ACM, 1974,17(7):412-421.

同被引文献39

  • 1王建新,安莹,吴国政,盛羽.基于组件的实时入侵检测虚拟实验室的设计与实现[J].系统仿真学报,2006,18(11):3283-3286. 被引量:9
  • 2王爱明,刘军,李纲,伊尧国.基于VRML远程虚拟教学系统的设计与实现[J].天津城市建设学院学报,2007,13(1):71-74. 被引量:3
  • 3陆炜妮,庞竣.基于Internet的计算机网络虚拟实验环境架构[J].计算机工程,2007,33(13):283-284. 被引量:19
  • 4Artem Dinahurg’Paul Royal,Monirul Sharif,et al. Ether:Malware Analysis via Hardware Virtualization Extensions[EB/OL].[2011-11-01]. http://ether.gtisc.gatech.edu/ether_ccs_2008.pdf.
  • 5Tal (iarfinkel,Mendel Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection[EB/OL].[2011-11—011. http://wenku.haidu.com/view/0ha56d2658fb770hf78a55eh.html.
  • 6Gerald J Popek,Robert P Goldberg. Formal Requirements for Virtualizable Third Generation Architectures[J]. Communicationsof the ACM, 1974,17(7):413-421.
  • 7Rutkowska Joanna. Red Pill or how to detect VMM using (almost) one CPU instruction[EB/OL]. (2004-11)[201 1-11-01].http://invisiblethings.org/papers/redpill.html.
  • 8Tobias Klein. Scoopy doo-Vmware fingerprint suite[EB/0L]. (2003)[2011-11-01]. http://www.trapkit.de/research/vmm/ scoopydoo/index.html.
  • 9Danny Quist,Val Smith. Detecting the presence of virtual machines using the local data table[EB/OL]. (2005)[201 1-11-01].http://www.offensivecomputing.net/dc 14/vm. pdf.
  • 10Li Sun,Tim Ehringer,Serdar Boztas. An automatic anti-anti-VMware technique applicable for multi-stage packed malware[EB/OL]. [2011-11-01]. http://wenku.haidu.com/view/d84440dl 84254h35eefd344f.html.

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部