Back to Results
First PageMeta Content
Virtual machines / Programming language implementation / Rootkit / Malware / Windows Virtual PC / Hypervisor / VirtualBox / Ring / Operating system / System software / Software / VMware


SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research
Add to Reading List

Document Date: 2006-03-03 22:37:06


Open Document

File Size: 204,53 KB

Share Result on Facebook

Company

Dell / VMBRs / VMM / Compaq / AMD / VMware / Intel / /

/

Facility

Samuel T. King Peter M. Chen University of Michigan / /

IndustryTerm

hard-drive block-device / video applications / example malicious services / emulated virtual devices / malicious web sites / guest applications / thttpd web server / detection software / physical hardware / trustworthy computing / hard-drive block device / intrusion detection systems / software-level abstractions / guest operating systems / host applications / network boot server / secure hardware / bootable media / infection target application target operating system host hardware / malicious software / virtual networking settings / user-level intrusion detection systems / web servers / software breakpoints / above hardware / host operating system host hardware / video editing applications / software / low-layer security software / security services / device emulation software / hardware devices / intrusion detection software / anti-malware software / virtual hardware / x86 processors / licious services / malicious services / virtual-machine technology / commodity hardware / phishing site / web server / software-level data / target systems / invisible malicious services / arbitrary malicious software / security software / anti-malware applications / virtual devices / guest software / /

OperatingSystem

Gentoo Linux / Linux / Windows XP / Microsoft Windows / /

Organization

University of Michigan / /

Person

J. Wang Jacob / Samuel T. King / Min Wang Chad Verbowski Helen / /

Position

keystroke logger / virtual keyboard controller / low-level disk driver / lowlevel disk driver / keystroke logger / a service / writer / low-level disk controller / Administrator / controller / /

ProgrammingLanguage

Perl / /

ProvinceOrState

Manitoba / /

Technology

virtual machine / Virtual PC / RAM / cable modem / virtual-machine technology / Linux system / peer-to-peer / Linux / technology of virtual machines / Perl / operating system / SSL / operating systems / encryption / paging / x86 processors / web server / class of service / GUI / /

SocialTag