Researches on Detecting Malware Based on Virtual Machine

被引:0
|
作者
Chen, Lin [1 ]
Liu, Bo [1 ]
Hu, Huaping [1 ]
Zhang, Jing [1 ]
机构
[1] Natl Univ Def Technol, Comp Sch, Changsha, Hunan, Peoples R China
来源
2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT) | 2012年
关键词
virtual machine; hardware virtualization; malware detection; semantic reconstruction; cross-view;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For more serious network security threat, security tools, also developed rapidly, but a fundamental limitation of traditional host-based anti-malware systems is that they run inside the very hosts they are protecting, making them vulnerable to counter-detection and subversion by malware, so VMM-based anti-malware systems have recently become a hot research field. Based on the analysis of existing malware detection technique using virtual machine, this article analysis and research on the different detection methods deeply, and point out possible research topics in the next step.
引用
收藏
页码:659 / 665
页数:7
相关论文
共 50 条
  • [21] MLMD-A Malware-Detecting Antivirus Tool Based on the XGBoost Machine Learning Algorithm
    Palsa, Jakub
    Adam, Norbert
    Hurtuk, Jan
    Chovancova, Eva
    Mados, Branislav
    Chovanec, Martin
    Kocan, Stanislav
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [22] Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting
    Lin, Tien-Chih
    Guo, Cheng-Chung
    Yang, Chu -Sing
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 760 - 768
  • [23] Virtual Structures and Heterogeneous Nodes in Dependency Graphs for Detecting Metamorphic Malware
    Martins, Gilbert Breves
    de Freitas, Rosiane
    Souto, Eduardo
    2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [24] Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques
    Chang, Ting-Yao
    Lai, Wei-Yu
    Hsiang, Tien-Ruey
    Mao, Ching-Hao
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 821 - 830
  • [25] Detecting Malware Based on DNS Graph Mining
    Zou, Futai
    Zhang, Siyu
    Rao, Weixiong
    Yi, Ping
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [26] Detecting Sensor-Based Repackaged Malware
    Liu, Boyu
    Yun, Duanyue
    Guo, Xin
    Ji, Xiao
    Song, Huiyu
    Singh, Shirish
    Kaiser, Gail
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5759 - 5761
  • [27] Detecting PE infection-based malware
    Chen, Chia-Mei
    Lai, Gu-Hsin
    Cai, Zheng-Xun
    Chang, Tzu-Ching
    Lee, Boyi
    International Journal of Security and Networks, 2021, 16 (03) : 191 - 199
  • [28] Memory Forensics Using Virtual Machine Introspection for Malware Analysis
    Tien, Chin-Wei
    Liao, Jian-Wei
    Chang, Shun-Chieh
    Kuo, Sy-Yen
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 518 - 519
  • [29] Measuring virtual machine detection in malware using DSD tracer
    Lau, Boris
    Svajcer, Vanja
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (03): : 181 - 195
  • [30] A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
    Hasan, Hayyan Salman
    Deeb, Hasan Muhammad
    Ladani, Behrouz Tork
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 59 - 71