Cloud computing provides on demand provisioning of resources mostly offered as Infrastructure as a Service. The flexibility in services has opened doors for attackers. Research has been performed to detect various malware in the last few years. However, modern malware are advanced enough to detect the presence of virtualization environment, security analyzer, or even the hypervisor by observing the virtualization-specific information such as virtual processor features, timing features, etc. The malware exhibit evasive nature and can fool existing security solutions by performing modern antidetection tactics. In this paper, we propose an approach named as VMI-assisted evasion detection (VAED), deployed at virtual machine monitor, to detect the evasion-based malware attacks. The VAED is based on learning the program semantic of evasive malware. It uses system call dependency graph approach generated using Markov Chain principle and keeps track of system call ordering with transition probability distribution between each pair system calls. It uses software break point injection technique to extract the system call traces of evasive malware samples, which is free from any modification in hardware-specific values. Hence, it is secure from evasion attempts. The VAED is validated over evasive samples collected from the University of California on request, and results seem to be promising. KEYWORDS cloud security, intrusion detection, system call analysis, virtual machine introspection 1 advanced malware that can detect the presence of the security analyzer, virtualization environment, or hypervisor. 1 On detection of such analysis environment, malware change their behavior to thwart the detection. Moreover, some of these attacks hide their presence from tenant virtual machine (TVM) by manipulating the kernel-data structure. Hence, analysis environment incorrectly classifies such intrusions as benign applications. A compromised VM is a big threat to cloud infrastructure, which can breach security of other VM, virtual machine monitor (VMM), or Host OS, etc. Cloud service provider needs to ensure the security of their infrastructure and VMs of their customers. Signature-based analysis, static analysis, dynamic analysis, and VM introspection (VMI) approaches are popular intrusion detection techniques used by researchers in their security solutions. Signature analysis techniques maintain a database of known attack signatures. Static analysis techniques perform the reverse engineering on the binary code to understand the program-syntax behavior. Dynamic analysis techniques observe the Concurrency Computat: Pract Exper. 2017;29:e4133.wileyonlinelibrary.com/journal/cpe