Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system

TK Lengyel, S Maresca, BD Payne… - Proceedings of the 30th …, 2014 - dl.acm.org
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

Detecting hardware-assisted virtualization

M Brengel, M Backes, C Rossow - … 2016, San Sebastián, Spain, July 7-8 …, 2016 - Springer
Virtualization has become an indispensable technique for scaling up the analysis of
malicious code, such as for malware analysis or shellcode detection systems. Frameworks …

{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents

F Schwarz, C Rossow - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …

Rapidvmi: Fast and multi-core aware active virtual machine introspection

T Dangl, B Taubmann, HP Reiser - Proceedings of the 16th International …, 2021 - dl.acm.org
Virtual machine introspection (VMI) is a technique for the external monitoring of virtual
machines. Through previous work, it became apparent that VMI can contribute to the security …

The other guys: automated analysis of marginalized malware

MF Botacin, PL de Geus, ARA Grégio - Journal of Computer Virology and …, 2018 - Springer
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been
using several file formats and evasive techniques. While publicly available dynamic …

Hardware-assisted MMU redirection for in-guest monitoring and API profiling

SW Hsiao, YS Sun, MC Chen - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the advance of hardware, network, and virtualization technologies, cloud computing
has prevailed and become the target of security threats such as the cross virtual machine …

Api chaser: Taint-assisted sandbox for evasive malware analysis

Y Kawakoya, E Shioji, M Iwamura… - Journal of Information …, 2019 - jstage.jst.go.jp
We propose a design and implementation for an Application Programming Interface (API)
monitoring system called API Chaser, which is resistant to evasion-type anti-analysis …

Detect kernel-mode rootkits via real time logging & controlling memory access

I Korkin, S Tanda - arxiv preprint arxiv:1705.06784, 2017 - arxiv.org
Modern malware and spyware platforms attack existing antivirus solutions and even
Microsoft PatchGuard. To protect users and business systems new technologies developed …