dc.contributor.author | Leon, Roee S. | |
dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Zabag, Anat Anatey Leon | |
dc.contributor.author | Zaidenberg, Nezer Jacob | |
dc.date.accessioned | 2021-06-04T04:30:21Z | |
dc.date.available | 2021-06-04T04:30:21Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Leon, R. S., Kiperberg, M., Zabag, A. A. L., & Zaidenberg, N. J. (2021). Hypervisor-assisted dynamic malware analysis. <i>Cybersecurity</i>, <i>4</i>, Article 19. <a href="https://doi.org/10.1186/s42400-021-00083-9" target="_blank">https://doi.org/10.1186/s42400-021-00083-9</a> | |
dc.identifier.other | CONVID_89804782 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/76199 | |
dc.description.abstract | Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transparent to the running OS and its applications. The evaluation of the system’s efficiency suggests that the induced performance overhead is negligible. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartofseries | Cybersecurity | |
dc.rights | CC BY 4.0 | |
dc.title | Hypervisor-assisted dynamic malware analysis | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202106043426 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 2523-3246 | |
dc.relation.volume | 4 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s). 2021 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | virtualisointi | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietoturva | |
dc.subject.yso | haittaohjelmat | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22009 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2837 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1186/s42400-021-00083-9 | |
jyx.fundinginformation | This research was not funded. | |
dc.type.okm | A1 | |