Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne… - Proceedings of the 30th …, 2014 - dl.acm.org
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …
defensive solutions requires the rapid analysis of a continuously increasing number of …
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …
based on social engineering to advanced persistent threats. Recent research and …
Detecting hardware-assisted virtualization
Virtualization has become an indispensable technique for scaling up the analysis of
malicious code, such as for malware analysis or shellcode detection systems. Frameworks …
malicious code, such as for malware analysis or shellcode detection systems. Frameworks …
{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …
Their protection against undesired VM inspection by malicious or compromised cloud …
Rapidvmi: Fast and multi-core aware active virtual machine introspection
Virtual machine introspection (VMI) is a technique for the external monitoring of virtual
machines. Through previous work, it became apparent that VMI can contribute to the security …
machines. Through previous work, it became apparent that VMI can contribute to the security …
The other guys: automated analysis of marginalized malware
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been
using several file formats and evasive techniques. While publicly available dynamic …
using several file formats and evasive techniques. While publicly available dynamic …
Hardware-assisted MMU redirection for in-guest monitoring and API profiling
With the advance of hardware, network, and virtualization technologies, cloud computing
has prevailed and become the target of security threats such as the cross virtual machine …
has prevailed and become the target of security threats such as the cross virtual machine …
Api chaser: Taint-assisted sandbox for evasive malware analysis
We propose a design and implementation for an Application Programming Interface (API)
monitoring system called API Chaser, which is resistant to evasion-type anti-analysis …
monitoring system called API Chaser, which is resistant to evasion-type anti-analysis …
Detect kernel-mode rootkits via real time logging & controlling memory access
I Korkin, S Tanda - arxiv preprint arxiv:1705.06784, 2017 - arxiv.org
Modern malware and spyware platforms attack existing antivirus solutions and even
Microsoft PatchGuard. To protect users and business systems new technologies developed …
Microsoft PatchGuard. To protect users and business systems new technologies developed …