Modern virtual machines, debuggers, and sandboxing solutions lend themselves towards more and more inconspicuous ways to run honeypots, and to observe and analyze malware and other malicious activity. This analysis yields valuable data for threat-assessment, malware identification and prevention. However, the use of such introspection methods has caused malware authors to create malicious programs with the ability to detect and evade such environments. This paper presents an overview on existing research of anti-honeypot and anti-introspection methods. We also propose our own taxonomy of detection vectors used by malware.
CITATION STYLE
Uitto, J., Rauti, S., Laurén, S., & Leppänen, V. (2017). A survey on anti-honeypot and anti-introspection methods. In Advances in Intelligent Systems and Computing (Vol. 570, pp. 125–134). Springer Verlag. https://doi.org/10.1007/978-3-319-56538-5_13
Mendeley helps you to discover research relevant for your work.