dc.contributor.author | Algawi, Asaf | |
dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Leon, Roee | |
dc.contributor.author | Resh, Amit | |
dc.contributor.author | Zaidenberg, Nezer | |
dc.contributor.editor | Cruz, Tiago | |
dc.contributor.editor | Simoes, Paulo | |
dc.date.accessioned | 2020-01-07T07:24:37Z | |
dc.date.available | 2020-01-07T07:24:37Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Algawi, A., Kiperberg, M., Leon, R., Resh, A., & Zaidenberg, N. (2019). Creating modern blue pills and red pills. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 6-14). Academic Conferences International. Proceedings of the European conference on information warfare and security. | |
dc.identifier.other | CONVID_32290737 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67098 | |
dc.description.abstract | The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race between developers that try to develop stealthy hypervisors and developers that try to detect such stealthy hypervisors. Furthermore, hardware advances have made several stealth attempts impossible while other advances enable even more stealthy operation. In this paper we describe the current status of detecting stealth hypervisors and methods to counter them. | en |
dc.format.extent | 884 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on information warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | virtualization | |
dc.subject.other | forensics | |
dc.subject.other | information security | |
dc.title | Creating modern blue pills and red pills | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202001071039 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-28-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 6-14 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s) 2019 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietomurto | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | virtualisointi | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kyberrikollisuus | |
dc.subject.yso | tekninen rikostutkinta | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27294 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22009 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29491 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p28613 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A4 | |