@inproceedings{9872f6233bfb46049a4a7e3f86f6a80e,
title = "VMCloak: Toward a stealthy in-VM agent execution",
abstract = "In-VM agent programs are generally used for the convenience of VM monitor in malware analysis. To prevent malicious interference, the stealthy execution of an in-VM agent is desirable. Existing approaches for stealthy execution of the agent remains detectable if libraries or kernel code of the guest OS is contaminated by malware. Moreover, the lack of applicability to conventional executables limits the agent functionality. In this paper, VMCloak is proposed for the stealthy in-VM agent execution. Our scheme leverages the virtualization technology to perform the real-time binary instrumentation to conceal the fingerprints of an in-VM agent from potential detection. Both stealthiness and integrity of the agent are guaranteed even when the guest OS is compromised. The evaluation shows that VMCloak can cope with the applicability issues, allowing the in-VM agent to perform the same operations as that of ordinary executables.",
keywords = "Malware, Software security, Virtual machine",
author = "Chiawei Wang and Shiuhpyng Shieh",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 2017 IEEE Conference on Dependable and Secure Computing ; Conference date: 07-08-2017 Through 10-08-2017",
year = "2017",
month = oct,
day = "18",
doi = "10.1109/DESEC.2017.8073802",
language = "English",
series = "2017 IEEE Conference on Dependable and Secure Computing",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "115--122",
booktitle = "2017 IEEE Conference on Dependable and Secure Computing",
address = "美國",
}