Delta Encoding of Virtual-Machine Memory in the Dynamic Analysis of Malware

被引:2
|
作者
Fowler, James E. [1 ]
机构
[1] Mississippi State Univ, DASI, Dept Elect & Comp Engn, Starkville, MS 39762 USA
关键词
D O I
10.1109/DCC.2016.66
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:592 / 592
页数:1
相关论文
共 50 条
  • [1] Memory Forensics Using Virtual Machine Introspection for Malware Analysis
    Tien, Chin-Wei
    Liao, Jian-Wei
    Chang, Shun-Chieh
    Kuo, Sy-Yen
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 518 - 519
  • [2] Virtual-Machine Abstraction and Optimization Techniques
    Brunthaler, Stefan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 253 (05) : 3 - 14
  • [3] Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres
    Salam Ismaeel
    Raed Karim
    Ali Miri
    Journal of Cloud Computing, 7
  • [4] Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres
    Ismaeel, Salam
    Karim, Raed
    Miri, Ali
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2018, 7
  • [5] Malware Detection using Machine Learning Based Analysis of Virtual Memory Access Patterns
    Xu, Zhixing
    Ray, Sayak
    Subramanyan, Pramod
    Malik, Sharad
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 169 - 174
  • [6] HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation
    Lin, Kunli
    Liu, Wenqing
    Zhang, Kun
    Tu, Bibo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2925 - 2938
  • [7] An energy hub based on virtual-machine control
    Sheng, Wanxing
    Liu, Haitao
    Zeng, Zheng
    Lü, Zhipeng
    Tan, Qian
    Duan, Qing
    Ran, Li
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2015, 35 (14): : 3541 - 3550
  • [8] STANDARDIZATION OF MICROCOMPUTER SOFTWARE USING VIRTUAL-MACHINE DESIGN
    MATIYASEVICH, YV
    TEREKHOV, AN
    FEDOTOV, BA
    AUTOMATION AND REMOTE CONTROL, 1990, 51 (05) : 710 - 716
  • [9] ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    Dunlap, GW
    King, ST
    Cinar, S
    Basrai, MA
    Chen, PM
    USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 211 - 224
  • [10] A Virtual-Machine Resiliency Management System for the Cloud
    Salapura, Valentina
    Harper, Rick
    IEEE CLOUD COMPUTING, 2018, 5 (03): : 55 - 64