Skip to main navigation Skip to search Skip to main content

Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization

  • Guofeng Wang*
  • , Chuanyi Liu
  • , Jie Lin
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Modern malware attacks are designed intricately, transport data encrypted, so monitoring network traffic can't solve such attacks completely. Therefore, network monitoring and analysis need to be combined with system behavior monitoring and memory analysis, and the latter is more important. In this article we propose a hardware-based virtualization prototype system, combined with memory analysis tools to monitor and counterwork malicious attacks actively. The system is based on Xen virtualization platform, which monitoring virtual machine behavior by capturing specific events. The events are triggered by some specific behaviors associated with malicious software monitoring, such as executing privileged instruction, system calls, memory writing, etc. When necessary, we can dump the memory of the virtual machine, use memory analysis tools for detailed analysis, so as to achieve the purpose of monitoring and counterworking.

Original languageEnglish
Title of host publicationTrustworthy Computing and Services - International Conference, ISCTCS 2013, Revised Selected Papers
PublisherSpringer Verlag
Pages29-37
Number of pages9
ISBN (Print)9783662439074
DOIs
StatePublished - 2014
Externally publishedYes
EventInternational Standard Conference on Trustworthy Computing and Services, ISCTCS 2013 - Beijing, China
Duration: 1 Nov 20131 Nov 2013

Publication series

NameCommunications in Computer and Information Science
Volume426 CCIS
ISSN (Print)1865-0929

Conference

ConferenceInternational Standard Conference on Trustworthy Computing and Services, ISCTCS 2013
Country/TerritoryChina
CityBeijing
Period1/11/131/11/13

Keywords

  • Hardware assisted virtualization
  • Malware attacks detecting
  • Memory analysis

Fingerprint

Dive into the research topics of 'Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization'. Together they form a unique fingerprint.

Cite this