2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010
DOI: 10.1109/securware.2010.35
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the x86 Architecture to Derive Virtual Machine State Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Over the past few years, concrete contributions to VMI have been made, and various methods have been suggested to inspect VM data from the outside [22][23][24]. As mentioned above, the difficulty in interpreting the lowlevel bits and bytes of a VM into the high-level semantic state of a guest OS is called the "semantic gap problem" [25][26][27][28]. It is very difficult to derive a complete view of a guest OS from outside a GM without knowledge of the hardware architecture or guest OS [29].…”
Section: Vmi-based Malwarementioning
confidence: 99%
“…Over the past few years, concrete contributions to VMI have been made, and various methods have been suggested to inspect VM data from the outside [22][23][24]. As mentioned above, the difficulty in interpreting the lowlevel bits and bytes of a VM into the high-level semantic state of a guest OS is called the "semantic gap problem" [25][26][27][28]. It is very difficult to derive a complete view of a guest OS from outside a GM without knowledge of the hardware architecture or guest OS [29].…”
Section: Vmi-based Malwarementioning
confidence: 99%
“…The problem of extracting high-level semantic information from low-level data sources is known as the semantic gap, and has sparked much research activity in recent years [7,21]. We now discuss how DiskDuster bridges it.…”
Section: The Process Monitor: Tracking Attacks At Thread Granularitymentioning
confidence: 99%
“…It has already been shown [13,17] that VT microprocessor support features can be used for introspection activities. Useful information related to guest VM implementation can be retrieved by monitoring the VM control structure (VMCS) of the processor.…”
Section: Introspection Using Virtualization Supportmentioning
confidence: 99%