Title
Compatibility is not transparency: VMM detection myths and realities
Abstract
Recent work on applications ranging from realistic honeypots to stealthier rootkits has speculated about building transparent VMMs - VMMs that are indistinguishable from native hardware, even to a dedicated adversary. We survey anomalies between real and virtual hardware and consider methods for detecting such anomalies, as well as possible countermeasures. We conclude that building a transparent VMM is fundamentally infeasible, as well as impractical from a performance and engineering standpoint.
Year
Venue
Keywords
2007
HotOS
transparent vmm,possible countermeasures,native hardware,dedicated adversary,recent work,transparent vmms,virtual hardware,engineering standpoint,vmm detection myth,realistic honeypots
Field
DocType
Citations 
Honeypot,Transparency (graphic),Compatibility (mechanics),Computer security,Computer science,Rootkit,Ranging,Virtual hardware,Adversary
Conference
76
PageRank 
References 
Authors
3.86
12
4
Name
Order
Citations
PageRank
Tal Garfinkel12008171.66
Keith Adams2919.99
Andrew Warfield35226430.99
Jason Franklin472556.46