Creating modern blue pills and red pills
Algawi, A., Kiperberg, M., Leon, R., Resh, A., & Zaidenberg, N. (2019). Creating modern blue pills and red pills. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 6-14). Academic Conferences International. Proceedings of the European conference on information warfare and security.
Date
2019Copyright
© The Author(s) 2019
The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race between developers that try to develop stealthy hypervisors and developers that try to detect such stealthy hypervisors. Furthermore, hardware advances have made several stealth attempts impossible while other advances enable even more stealthy operation. In this paper we describe the current status of detecting stealth hypervisors and methods to counter them.
Publisher
Academic Conferences InternationalParent publication ISBN
978-1-912764-28-0Conference
European Conference on Cyber Warfare and SecurityIs part of publication
ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and SecurityISSN Search the Publication Forum
2048-8602Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/32290737
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Literature review of information security practice survey reports
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ... -
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
Kiperberg, Michael; Leon, Roee; Resh, Amit; Algawi, Asaf; Zaidenberg, Nezer (SCITEPRESS Science And Technology Publications, 2019)Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, ... -
Hypervisor memory acquisition for ARM
Ben Yehuda, Raz; Shlingbaum, Erez; Gershfeld, Yuval; Tayouri, Shaked; Zaidenberg, Nezer Jacob (Elsevier, 2021)Cyber forensics use memory acquisition in advanced forensics and malware analysis. We propose a hypervisor based memory acquisition tool. Our implementation extends the volatility memory forensics framework by reducing the ... -
Kyberrikollisuus modernissa tietoyhteiskunnassa
Siltainsuu, Janne (2017)Tämä tutkielma käsittelee kyberrikollisuutta modernissa tietoyhteiskunnassa. Tutkimuksessa pohditaan kyberrikollisuuden ilmenemistä, kyberrikollisten motiiveja sekä suojautumista kyberrikoksia vastaan. Kyberrikollisuus ... -
Tietoturvakulttuurin rakentuminen Finavian viestinnässä
Seppänen, Teemu (2021)Tutkielman tavoitteena on kuvata ja ymmärtää tietoturvaviestinnän yhteyttä organisaation tietoturvakulttuurin rakentumiseen. Tietoturva on organisaatioille kasvava prioriteetti ja työntekijöiden rooli tietoturvan toteutumisessa ...