Visible to the public Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection

TitleHiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Publication TypeConference Paper
Year of Publication2018
AuthorsProskurin, Sergej, Lengyel, Tamas, Momeu, Marius, Eckert, Claudia, Zarras, Apostolis
Conference NameProceedings of the 34th Annual Computer Security Applications Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6569-7
Keywordscomposability, cryptography, cyber physical systems, pubcrawl, Resiliency, virtual machine security
Abstract

ARM has become the leading processor architecture for mobile and IoT devices, while it has recently started claiming a bigger slice of the server market pie as well. As such, it will not be long before malware more regularly target the ARM architecture. Therefore, the stealthy operation of Virtual Machine Introspection (VMI) is an obligation to successfully analyze and proactively mitigate this growing threat. Stealthy VMI has proven itself perfectly suitable for malware analysis on Intel's architecture, yet, it often lacks the foundation required to be equally effective on ARM.

URLhttps://dl.acm.org/citation.cfm?doid=3274694.3274698
DOI10.1145/3274694.3274698
Citation KeyproskurinHidingShadowsEmpowering2018