Publications
Handling anti-virtual machine techniques in malicious software
Abstract
Malware analysis relies heavily on the use of virtual machines (VMs) for functionality and safety. There are subtle differences in operation between virtual and physical machines. Contemporary malware checks for these differences and changes its behavior when it detects a VM presence. These anti-VM techniques hinder malware analysis. Existing research approaches to uncover differences between VMs and physical machines use randomized testing, and thus cannot guarantee completeness.
In this article, we propose a detect-and-hide approach, which systematically addresses anti-VM techniques in malware. First, we propose cardinal pill testing—a modification of red pill testing that aims to enumerate the differences between a given VM and a physical machine through carefully designed tests. Cardinal pill testing finds five times more pills by running 15 times fewer tests than red pill testing. We examine the …
Metadata
- publication
- ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31, 2017
- year
- 2017
- publication date
- 2017/12/6
- authors
- Hao Shi, Jelena Mirkovic, Abdulla Alwabel
- link
- https://dl.acm.org/doi/abs/10.1145/3139292
- journal
- ACM Transactions on Privacy and Security (TOPS)
- volume
- 21
- issue
- 1
- pages
- 1-31
- publisher
- ACM