【24h】

DETECTING EMULATED ENVIRONMENTS

机译:检测模拟环境

获取原文
获取原文并翻译 | 示例
           

摘要

One of the most powerful tools in the hacker's reverse engineering arsenal is the virtual machine. These systems provide a simple mechanism for executing code in an environment in which the program can be carefully monitored and controlled, allowing attackers to subvert copy protection and access trade secrets. One of the challenges for anti-reverse engineering tools is how to protect software within such an untrustworthy environment. From the perspective of a running program, detecting an emulated environment is not trivial: the attacker can emulate the result of different operations with arbitrarily high fidelity. This paper demonstrates a mechanism that is able to detect even carefully constructed virtual environments by focusing on the stochastic variation of system call timings. A statistical technique for detecting emulated environments is presented, which uses a model of normal system call behavior to successfully identify two commonly used virtual environments under realistic conditions.
机译:虚拟机是黑客的逆向工程工具库中最强大的工具之一。这些系统提供了一种简单的机制,可以在可以仔细监视和控制程序的环境中执行代码,从而使攻击者可以破坏复制保护并访问商业秘密。防逆向工程工具的挑战之一是如何在这种不可信任的环境中保护软件。从正在运行的程序的角度来看,检测仿真环境并非易事:攻击者可以任意保真地仿真不同操作的结果。本文演示了一种机制,该机制能够通过关注系统调用时序的随机变化来检测精心构建的虚拟环境。提出了一种用于检测仿真环境的统计技术,该技术使用正常系统调用行为的模型来成功识别现实条件下的两个常用虚拟环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号