Using Hardware Isolated Execution Environments for Securing Systems

dc.contributor.advisorStavrou, Angelos
dc.contributor.authorZhang, Fengwei
dc.creatorZhang, Fengwei
dc.date.accessioned2015-07-29T18:42:49Z
dc.date.available2015-07-29T18:42:49Z
dc.date.issued2015
dc.description.abstractWith the rapid proliferation of malware attacks on the Internet, malware detection and analysis play a critical role in crafting effective defenses. Advanced malware detection and analysis rely on virtualization and emulation technologies to introspect the malware in an isolated environment and analyze malicious activities by instrumenting code execution. Virtual Machine Introspection (VMI) systems have been widely adopted for malware detection and analysis. VMI systems use hypervisor technology to create an isolated execution environment for system introspection and to expose malicious activity. However, recent malware can detect the presence of virtualization or corrupt the hypervisor state and thus avoid detection and debugging.
dc.format.extent148 pages
dc.identifier.urihttps://hdl.handle.net/1920/9700
dc.language.isoen
dc.rightsCopyright 2015 Fengwei Zhang
dc.subjectComputer science
dc.subjectDebugging
dc.subjectDetection
dc.subjectMalware
dc.subjectSMM
dc.subjectTransparency
dc.titleUsing Hardware Isolated Execution Environments for Securing Systems
dc.typeDissertation
thesis.degree.disciplineComputer Science
thesis.degree.grantorGeorge Mason University
thesis.degree.levelDoctoral

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Zhang_gmu_0883E_10866.pdf
Size:
2.89 MB
Format:
Adobe Portable Document Format