Show simple item record

dc.contributor.authorAlgawi, Asaf
dc.contributor.authorKiperberg, Michael
dc.contributor.authorLeon, Roee
dc.contributor.authorResh, Amit
dc.contributor.authorZaidenberg, Nezer
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-07T07:24:37Z
dc.date.available2020-01-07T07:24:37Z
dc.date.issued2019
dc.identifier.citationAlgawi, A., Kiperberg, M., Leon, R., Resh, A., & Zaidenberg, N. (2019). Creating modern blue pills and red pills. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 6-14). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32290737
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67098
dc.description.abstractThe blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race between developers that try to develop stealthy hypervisors and developers that try to detect such stealthy hypervisors. Furthermore, hardware advances have made several stealth attempts impossible while other advances enable even more stealthy operation. In this paper we describe the current status of detecting stealth hypervisors and methods to counter them.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.othervirtualization
dc.subject.otherforensics
dc.subject.otherinformation security
dc.titleCreating modern blue pills and red pills
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001071039
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.description.reviewstatuspeerReviewed
dc.format.pagerange6-14
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysotietomurto
dc.subject.ysoverkkohyökkäykset
dc.subject.ysovirtualisointi
dc.subject.ysotietoturva
dc.subject.ysokyberrikollisuus
dc.subject.ysotekninen rikostutkinta
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p27294
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p22009
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p29491
jyx.subject.urihttp://www.yso.fi/onto/yso/p28613
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright