Abstract | ||
---|---|---|
Recent work on applications ranging from realistic honeypots to stealthier rootkits has speculated about building transparent VMMs - VMMs that are indistinguishable from native hardware, even to a dedicated adversary. We survey anomalies between real and virtual hardware and consider methods for detecting such anomalies, as well as possible countermeasures. We conclude that building a transparent VMM is fundamentally infeasible, as well as impractical from a performance and engineering standpoint. |
Year | Venue | Keywords |
---|---|---|
2007 | HotOS | transparent vmm,possible countermeasures,native hardware,dedicated adversary,recent work,transparent vmms,virtual hardware,engineering standpoint,vmm detection myth,realistic honeypots |
Field | DocType | Citations |
Honeypot,Transparency (graphic),Compatibility (mechanics),Computer security,Computer science,Rootkit,Ranging,Virtual hardware,Adversary | Conference | 76 |
PageRank | References | Authors |
3.86 | 12 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tal Garfinkel | 1 | 2008 | 171.66 |
Keith Adams | 2 | 91 | 9.99 |
Andrew Warfield | 3 | 5226 | 430.99 |
Jason Franklin | 4 | 725 | 56.46 |