A survey on anti-honeypot and anti-introspection methods

22Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern virtual machines, debuggers, and sandboxing solutions lend themselves towards more and more inconspicuous ways to run honeypots, and to observe and analyze malware and other malicious activity. This analysis yields valuable data for threat-assessment, malware identification and prevention. However, the use of such introspection methods has caused malware authors to create malicious programs with the ability to detect and evade such environments. This paper presents an overview on existing research of anti-honeypot and anti-introspection methods. We also propose our own taxonomy of detection vectors used by malware.

Cite

CITATION STYLE

APA

Uitto, J., Rauti, S., Laurén, S., & Leppänen, V. (2017). A survey on anti-honeypot and anti-introspection methods. In Advances in Intelligent Systems and Computing (Vol. 570, pp. 125–134). Springer Verlag. https://doi.org/10.1007/978-3-319-56538-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free