Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Title | Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Proskurin, Sergej, Lengyel, Tamas, Momeu, Marius, Eckert, Claudia, Zarras, Apostolis |
Conference Name | Proceedings of the 34th Annual Computer Security Applications Conference |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6569-7 |
Keywords | composability, cryptography, cyber physical systems, pubcrawl, Resiliency, virtual machine security |
Abstract | ARM has become the leading processor architecture for mobile and IoT devices, while it has recently started claiming a bigger slice of the server market pie as well. As such, it will not be long before malware more regularly target the ARM architecture. Therefore, the stealthy operation of Virtual Machine Introspection (VMI) is an obligation to successfully analyze and proactively mitigate this growing threat. Stealthy VMI has proven itself perfectly suitable for malware analysis on Intel's architecture, yet, it often lacks the foundation required to be equally effective on ARM. |
URL | https://dl.acm.org/citation.cfm?doid=3274694.3274698 |
DOI | 10.1145/3274694.3274698 |
Citation Key | proskurinHidingShadowsEmpowering2018 |