首页> 外文会议>International Symposium on Quality Electronic Design >Sandbox Detection Using Hardware Side Channels
【24h】

Sandbox Detection Using Hardware Side Channels

机译:使用硬件侧通道的沙箱检测

获取原文

摘要

A common way to detect malware attacks and avoid their destructive impact on a system is the use of virtual machines; A.K.A sandboxing. Attackers, on the other hand, strive to detect sandboxes when their software is running under such a virtual environment. Accordingly, they postpone launching any attack (Malware) as long as operating under such an execution environment. Thus, it is common among malware developers to utilize different sandbox detection techniques (sometimes referred to as Anti-VM or Anti-Virtualization techniques). In this paper, we present novel, side-channel-based techniques to detect sandboxes. We show that it is possible to detect even sandboxes that were properly configured and so far considered to be detection-proof. This paper proposes and implements the first attack which leverage side channels leakage between sibling logical cores to determine the execution environment.
机译:一种检测恶意软件攻击并避免其对系统的破坏性影响的常用方法是使用虚拟机; A.K.A沙盒。 另一方面,攻击者努力在其软件在这样的虚拟环境下运行时检测沙箱。 因此,他们推迟推出任何攻击(恶意软件),只要在这样的执行环境下运行。 因此,在恶意软件开发人员中常见的是利用不同的沙箱检测技术(有时称为抗VM或防虚拟化技术)。 在本文中,我们提出了基于侧通道的基于侧通道的技术来检测沙箱。 我们表明,可以检测到均匀配置的沙箱,迄今为止被认为是检测。 本文提出并实现了第一次攻击,它利用侧视通道泄漏赛道逻辑核心以确定执行环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号