A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
SubVirt: implementing malware with virtual machines
2006
2006 IEEE Symposium on Security and Privacy (S&P'06)
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection. By assuming this perspective, we hope to help defenders understand and defend against the threat posed by a new class of rootkits. We evaluate a new type of malicious software
doi:10.1109/sp.2006.38
dblp:conf/sp/KingCWVWL06
fatcat:ni66zp57gjeqfn64qdzpqzz3yq