Näytä suppeat kuvailutiedot

dc.contributor.authorLeon, Roee S.
dc.contributor.authorKiperberg, Michael
dc.contributor.authorZabag, Anat Anatey Leon
dc.contributor.authorZaidenberg, Nezer Jacob
dc.date.accessioned2021-06-04T04:30:21Z
dc.date.available2021-06-04T04:30:21Z
dc.date.issued2021
dc.identifier.citationLeon, R. S., Kiperberg, M., Zabag, A. A. L., & Zaidenberg, N. J. (2021). Hypervisor-assisted dynamic malware analysis. <i>Cybersecurity</i>, <i>4</i>, Article 19. <a href="https://doi.org/10.1186/s42400-021-00083-9" target="_blank">https://doi.org/10.1186/s42400-021-00083-9</a>
dc.identifier.otherCONVID_89804782
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/76199
dc.description.abstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transparent to the running OS and its applications. The evaluation of the system’s efficiency suggests that the induced performance overhead is negligible.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofseriesCybersecurity
dc.rightsCC BY 4.0
dc.titleHypervisor-assisted dynamic malware analysis
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-202106043426
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.relation.issn2523-3246
dc.relation.volume4
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s). 2021
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysovirtualisointi
dc.subject.ysokyberturvallisuus
dc.subject.ysotietoturva
dc.subject.ysohaittaohjelmat
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p22009
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p2837
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1186/s42400-021-00083-9
jyx.fundinginformationThis research was not funded.
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0