%0 Journal Article
%T Detecting hidden process with local virtualization technology
基于本地虚拟化技术的隐藏进程检测
%A WEN Yan
%A ZHAO Jin-jing
%A WANG Huai-min
%A
温研
%A 赵金晶
%A 王怀民
%J 计算机应用
%D 2008
%I
%X Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we presented a new VM-based approach called Gemini that accurately reproduced the software environment of the underlying preinstalled OS within the Gemini VM. With our new local-booting technology, Gemini VM just booted from the underlying host OS but not a newly installed OS image. In addition, Gemini adopted a unique technique to implicitly construct the Trusted View of Process List (TVPL) from within the virtualized hardware layer. Thus, Gemini provided a way to detect the existing process-hiding stealth malware in the host OS. Our evaluation results with real-world hiding-process rootkits, which are widely used by stealth malware, demonstrate its practicality and effectiveness.
%K virtual machine monitor (VMM)
%K virtual machine (VM)
%K stealth malware
%K local virtualization
%K process hiding
虚拟机监视器
%K 虚拟机
%K 自隐藏恶意代码
%K 本地虚拟化技术
%K 进程隐藏
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=831E194C147C78FAAFCC50BC7ADD1732&aid=0C8EE2BB2CD6E723BE32451D886086EE&yid=67289AFF6305E306&vid=D3E34374A0D77D7F&iid=DF92D298D3FF1E6E&sid=DF28BAAD0FD19027&eid=8A16493E4294FD55&journal_id=1001-9081&journal_name=计算机应用&referenced_num=0&reference_num=10